Powered by Deep Web Technologies
Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

2

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

3

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

4

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

5

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

6

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

7

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

8

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

9

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

10

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

11

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

12

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

13

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

14

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

15

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

16

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

17

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

18

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

19

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

20

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

22

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

23

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

24

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

25

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

26

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

27

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

28

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

29

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

30

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

31

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

32

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

33

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

34

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

35

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

36

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

37

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

38

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

39

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

40

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

42

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

43

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

44

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

45

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

46

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

47

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

48

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

49

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

50

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

51

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

52

U-198: IBM Lotus Expeditor Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

53

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

54

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

55

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

56

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

57

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

58

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

59

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

60

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

62

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

63

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

64

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

65

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

66

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

67

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur.

68

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

69

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

70

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

71

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

72

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

73

V-211: IBM iNotes Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability

74

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

75

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

76

U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

77

U-171: DeltaV Products Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71: DeltaV Products Multiple Vulnerabilities 71: DeltaV Products Multiple Vulnerabilities U-171: DeltaV Products Multiple Vulnerabilities May 17, 2012 - 7:00am Addthis PROBLEM: DeltaV Products Multiple Vulnerabilities PLATFORM: DeltaV and DeltaV Workstations versions 9.3.1, 10.3.1, 11.3, and 11.3.1 DeltaV ProEssentials Scientific Graph version 5.0.0.6 ABSTRACT: Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference LINKS: Secunia Advisory SA49210 CVE-2012-1814 CVE-2012-1815 CVE-2012-1816 CVE-2012-1817 CVE-2012-1818 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and

78

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

79

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

80

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

82

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Broader source: Energy.gov (indexed) [DOE]

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

83

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

84

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers [EERE]

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

85

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Broader source: Energy.gov (indexed) [DOE]

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

86

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

87

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

88

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

89

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

90

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

91

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

92

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

93

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

94

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

95

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

96

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

97

Multiple Rankine topping cycles  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

98

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

99

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

100

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

102

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

103

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

104

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

105

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Broader source: Energy.gov (indexed) [DOE]

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

106

Multiple System Rate Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

107

Multiple sclerosis and interferon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

108

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

109

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

110

Traits and Multiple Genes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

111

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

112

Hadron multiplicities at the LHC  

E-Print Network [OSTI]

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

113

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

114

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

115

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

116

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

7: OpenSC Smart Card Serial Number Multiple Buffer Overflow 7: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities January 4, 2011 - 5:52pm Addthis PROBLEM: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities PLATFORM: Vulnerable Platform: OpenSC 0.11.13 ABSTRACT: OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. reference LINKS: SecurityFocus - OpenSC Smart Card Serial CVE-2010-4523 OpenSC: Three stack-based buffer overflows CVE-2010-4523 - Three stack-based buffer overflows

117

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

118

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

119

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

120

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

122

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

123

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

124

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

125

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

126

Federal Energy Management Program: Multiple Motivations Institutional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

127

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

128

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

129

Multiple smart weapons employment mechanism  

SciTech Connect (OSTI)

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

130

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

131

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

132

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

133

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

134

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

135

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Broader source: Energy.gov (indexed) [DOE]

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

136

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

137

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

138

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network [OSTI]

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

139

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

140

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Recirculation in multiple wave conversions  

SciTech Connect (OSTI)

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

142

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

143

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

144

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

145

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

146

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

147

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

148

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

149

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

150

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network [OSTI]

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

151

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

152

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

153

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

154

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

155

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network [OSTI]

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

156

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

157

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

158

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

159

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

160

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

162

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

163

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect (OSTI)

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

164

PJM Interconnection (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

165

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

166

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

167

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

168

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

169

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

170

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

171

Friction and the Multiplicity of Equilibria  

E-Print Network [OSTI]

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

172

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect (OSTI)

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

173

An analysis of multiple component mooring lines  

E-Print Network [OSTI]

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

174

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

175

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

176

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

177

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

178

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

179

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

180

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

182

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

183

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

184

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

185

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabiliti...  

Broader source: Energy.gov (indexed) [DOE]

RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found...

186

V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

the Adobe Reader sandbox protection. 5) An unspecified error related to the Javascript API can be exploited to disclose certain information. 6) An unspecified error can be...

187

U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

of sensitive information System access Solution: The vendor has issued a fix. The patch is available at Adobe downloads Addthis Related Articles V-066: Adobe AcrobatReader...

188

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

189

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

190

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

191

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

192

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

193

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

194

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

195

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

196

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

197

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

198

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

199

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

200

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

202

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

203

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

204

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

205

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

206

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network [OSTI]

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

207

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

208

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

209

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

210

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

211

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

212

A material's multiple personalities | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

213

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

214

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

215

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network [OSTI]

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

216

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

217

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

218

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

219

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

220

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

222

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

223

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

224

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

225

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

226

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

227

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

228

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

229

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

230

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

231

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

232

Multiple gamma lines from semi-annihilation  

SciTech Connect (OSTI)

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

233

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

234

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

235

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

236

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

237

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

238

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

239

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

240

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

242

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

243

Building multiple adsorption sites in porous polymer networks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

244

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

245

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

246

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

247

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

248

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

249

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

250

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network [OSTI]

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

251

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

252

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

253

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

254

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

255

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

256

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

257

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

258

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

259

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

260

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

262

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network [OSTI]

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

263

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network [OSTI]

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

264

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

265

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents [OSTI]

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

266

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

267

Midwest Independent System Operator (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

268

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

269

Southern States Energy Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

270

Delaware River Basin Commission (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

271

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electron–hole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

272

Interstate Commission on the Potomac River Basin (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

273

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

274

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

275

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

276

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect (OSTI)

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

277

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network [OSTI]

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

278

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

279

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network [OSTI]

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

280

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network [OSTI]

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Competitive behavior of airlines at multiple airport systems  

E-Print Network [OSTI]

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

282

A simulation environment for multiple project resource optimization  

E-Print Network [OSTI]

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

283

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network [OSTI]

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

284

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

285

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

286

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network [OSTI]

Objective: To explore how a single master alarm system affects drivers’ responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

287

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

288

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network [OSTI]

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

289

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network [OSTI]

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

290

Multiple Motivations Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

291

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernández M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

292

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network [OSTI]

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

293

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

294

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35   v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

295

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network [OSTI]

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

296

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

297

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

298

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

299

New England Power Pool (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

300

North American Renewables Registry (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Broader source: Energy.gov (indexed) [DOE]

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

302

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

303

Sabine River Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

304

Tunable Multiple Layered Dirac Cones in Optical Lattices  

SciTech Connect (OSTI)

We show that multiple layered Dirac cones can emerge in the band structure of properly addressed multicomponent cold fermionic gases in optical lattices. The layered Dirac cones contain multiple copies of massless spin-1/2 Dirac fermions at the same location in momentum space, whose different Fermi velocity can be tuned at will. On-site microwave Raman transitions can further be used to mix the different Dirac species, resulting in either splitting of or preserving the Dirac point (depending on the symmetry of the on-site term). The tunability of the multiple layered Dirac cones allows us to simulate a number of fundamental phenomena in modern physics, such as neutrino oscillations and exotic particle dispersions with E{approx}p{sup N} for arbitrary integer N.

Lan, Z.; Lu, W.; Oehberg, P. [SUPA, Department of Physics, Heriot-Watt University, EH14 4AS, Edinburgh (United Kingdom); Celi, A. [ICFO - Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); Lewenstein, M. [ICFO - The Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); ICREA-Institucio Catalana de Recerca i Estudis Avancats, 08010 Barcelona (Spain)

2011-12-16T23:59:59.000Z

305

Multiple X-ray reflection from ionized slabs  

E-Print Network [OSTI]

Multiple reflection of X-rays may be important when an accretion disc and its hot corona have a complicated geometry, or if returning radiation due to gravitational light bending is important, or in emission from a funnel such as proposed in some gamma-ray burst models. We simulate the effects of multiple reflection by modifying the boundary condition for an X-ray illuminated slab. Multiple reflection makes the soft X-ray spectrum steeper (softer) and strengthens broad emission and absorption features, especially the K-shell features of iron. This may be important in explaining the spectra of sources such as the Narrow-Line Seyfert 1 galaxy 1H0707-495.

R. R. Ross; A. C. Fabian; D. R. Ballantyne

2002-06-11T23:59:59.000Z

306

Multiple mobile robots system with network-based subsumption architecture  

Science Journals Connector (OSTI)

In this paper, a unique multiple mobile robots system is proposed to enable engineering students and engineers in the field to efficiently learn subsumption architecture and develop swarm intelligence. The subsumption architecture is known as one of the behaviour-based artificial intelligence. Each of multiple mobile robots within the system has three wheels driven by DC motors and six position sensitive detector (PSD) sensors. Network-based subsumption architecture is considered to realise a schooling behaviour by using only information from the PSD sensors. Further, a server supervisory control is introduced for poor hardware platforms with limitations of software development, i.e., the mobile robots can only behave based on the most simply subdivided reaction behaviours, i.e., reflex actions, generated from agents. Experimental results show interesting behaviour among the multiple mobile robots, such as following, avoidance and schooling.

Fusaomi Nagata; Akimasa Otsuka; Keigo Watanabe; Maki K. Habib

2013-01-01T23:59:59.000Z

307

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect (OSTI)

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

308

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network [OSTI]

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

309

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

310

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network [OSTI]

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

311

Acceleration of the matrix multiplication of Radiance three phase  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

312

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network [OSTI]

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

313

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and  

E-Print Network [OSTI]

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and developmental processes China Received 26 January 2006; Accepted 20 April 2006 Abstract The scaffold protein RACK1 (Receptor. The Arabidopsis ge- nome contains three RACK1 orthologues, however, little is known about their functions

Jones, Alan M.

314

MULTIPLE CLASSIFIERS FOR ELECTRONIC NOSE DATA M. Pardo, G. Sberveglieri  

E-Print Network [OSTI]

of two groups of coffees (blends and monovarieties). The main idea of boosting is to produce a sequence for combining the predictions of multiple classifiers (briefly called ensembles) to produce a single classifier Certified Espresso (ICE)) and of 6 single varieties (SV) plus the ICE. The food manufacturing sector is one

Masulli, Francesco

315

Multiple Non-Thermal Reaction Steps for the Photooxidation CO...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110). Multiple Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110)....

316

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict- ing the occupancy of a building using networks of people-counting sensors-sensor probabilistic model for building occupancy. Inference for the oc- cupancy model follows in Section 4

Smyth, Padhraic

317

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict­ ing the occupancy of a building using networks of people­counting sensors­sensor probabilistic model for building occupancy. Inference for the oc­ cupancy model follows in Section 4

Ihler, Alexander

318

Instability of single-phase natural circulation under multiple loops  

SciTech Connect (OSTI)

Natural circulation loop passively conveys heat from heat sources to heat sinks without mechanical pump. Various plants have natural circulation systems, e.g., solar heaters, Light Water Reactor (LWR) and Liquid Metal Fast Breeder Reactor (LMFBR). The core of LMFBR is cooled by forced convection of single-phase liquid sodium in normal operation. After the accident, the decay heat of the core is designed to be cooled by the natural circulation of the liquid sodium. The natural circulation cooling is very important from a viewpoint of passive safety concept. Here, the natural circulation in single loop system had been studied by many researchers. In a multiple loop system, the instability of natural circulation was more complicated because of the interaction between the loops. In this study, the effects of the multiple loop on the natural circulation instability were investigated numerically. The multiple loops system with one heating tube and two cooling tubes were evaluated. The one-dimensional energy and momentum equations were solved using Finite Difference Method. The flow regimes of the instability were evaluated with varying the heat flux. In multiple loop system, the observed flow was classified into five regimes including chaotic regime. The flow regimes were qualitatively explained by the stability of the attractor in the phase space.

Satoh, A.; Okamoto, K.; Madarame, H. [Univ. of Tokyo, Tokai, Ibaraki (Japan). Nuclear Engineering Research Lab.

1996-08-01T23:59:59.000Z

319

Distributed event notification in VANET with multiple service providers  

Science Journals Connector (OSTI)

Many future applications in vehicular networks will be event-driven and will require events generated at different parts of a city to be delivered to moving vehicles in time. We propose a distributed framework for efficient event dissemination with multiple ... Keywords: VANET, distributed event notification, publish-subscribe

Joy Chandra Mukherjee, Saurabh Agarwal, Arobinda Gupta

2014-05-01T23:59:59.000Z

320

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs  

E-Print Network [OSTI]

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

Prasanna, Viktor K.

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Officers' Training Corps experience...unmanned vehicle operating environments...multiple personnel responsible...impact of training on boredom...domains, personnel selection is of practical...personnel selection considerations...stimulate personnel, such as...on-the-job training or possibly......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

322

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents [OSTI]

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

323

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences  

E-Print Network [OSTI]

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences Roman R. Stocsits1 , Ivo L Fe Institute, 1399 Hyde Park Rd., Santa Fe NM 87501, USA Email: Roman R. Stocsits - roman of the available sequence data was pre- sented very recently [12]. SARGLSSTVSLGQFEHWSPR NARNLSDTVS

Stadler, Peter F.

324

Fast Machine Code for Modular Multiplication Michael Scott  

E-Print Network [OSTI]

Fast Machine Code for Modular Multiplication Michael Scott School of Computer Applications Dublin, that is the calculation of a = b e mod n where for acceptable levels of security a, b, e, and n are large multiprecision will be not much larger than the number of bits in the binary representation of e. Therefore fast modular

Bernstein, Daniel

325

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network [OSTI]

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

326

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

327

Multiple Field of View MR Fluoroscopy Pelin Aksit,1  

E-Print Network [OSTI]

Multiple Field of View MR Fluoroscopy Pelin Aksit,1 J. Andrew Derbyshire,2 Jean-Michel Serfaty,1 by several investigators (1� 8). Intravascular MR compares favorably with other clini- cal diagnostic methods and Ergin Atalar1* This work describes a real-time imaging and visualization tech- nique that allows

Atalar, Ergin

328

Coordination of multiple appendages in drag-based swimming  

Science Journals Connector (OSTI)

...appendages for multi-oared propulsion. The typical Reynolds number...another example of drag-based propulsion with multiple appendages...of Bill Peterson, Hatfield Marine Center, Newport, OR...of a body with drag-based propulsion. The model provides a quantitative...

2010-01-01T23:59:59.000Z

329

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

330

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network [OSTI]

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

331

Method and system of integrating information from multiple sources  

DOE Patents [OSTI]

A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

2006-08-15T23:59:59.000Z

332

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network [OSTI]

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

333

Quantitative crystal structure descriptors from multiplicative congruential generators  

Science Journals Connector (OSTI)

Certain number-theoretic relations, known as multiplicative congruential generators, are developed into quantitative crystal structure descriptors, facilitating a linearization procedure that eventually allows for a concise, fully reconstructable representation of structural information. Potential applications are related to the computational storage, retrieval and analysis of crystal structures, their algorithmic generation in the first place, and their combinatorial enumeration and classification.

Hornfeck, W.

2012-01-12T23:59:59.000Z

334

Multiple Whole Genome Alignments Without a Reference Organism  

SciTech Connect (OSTI)

Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

2009-01-16T23:59:59.000Z

335

Robust Retrospective Multiple Change-point for Multivariate Data  

E-Print Network [OSTI]

on a test statistic that generalizes the well- known Kruskal-Wallis procedure to the multivariate setting noise levels and/or high-dimensional data. Keywords: Change-point estimation, multivariate data, Kruskal-Wallis as to deal with multiple change-points (in analogy with the way the classical Kruskal-Wallis test generalizes

Paris-Sud XI, Université de

336

Anatomy of High-Performance Many-Threaded Matrix Multiplication  

Science Journals Connector (OSTI)

BLIS is a new framework for rapid instantiation of the BLAS. We describe how BLIS extends the "GotoBLAS approach" to implementing matrix multiplication (GEMM). While GEMM was previously implemented as three loops around an inner kernel, BLIS exposes ... Keywords: linear algebra, libraries, high-performance, matrix, BLAS, multicore

Tyler M. Smith, Robert van de Geijn, Mikhail Smelyanskiy, Jeff R. Hammond, Field G. Van Zee

2014-05-01T23:59:59.000Z

337

A simple model of multiple climate regimes Kerry Emanuel  

E-Print Network [OSTI]

, and Climate, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA Received 28 June 2001 to a roughly 30% increase in solar insolation over the life of the planet. To this enigma may be added to produce multiple equilibrium states for the same solar forcing. Here we present a simple model

Emanuel, Kerry A.

338

Climate determinism revisited: multiple equilibria in a complex climate model  

E-Print Network [OSTI]

Marshall and Brian Rose Department of Earth, Atmospheric and Planetary Science, Massachusetts Institute of Technology, Cambridge, Massachusetts June 17th, 2010 Submitted to Journal of Climate Corresponding author by incoming solar radiation at the top of the atmosphere. We demonstrate that the multiple equilibria owe

Marshall, John

339

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

340

Extending wordnets by learning from multiple resources Benot Sagot+  

E-Print Network [OSTI]

Extending wordnets by learning from multiple resources Benoît Sagot+ , Darja Fiser* + Alpage, INRIA In this paper we present an automatic, language-independent approach to extend an existing wordnet by recycling existing freely available bilingual resources, such as machine-readable dictionaries and on

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE  

E-Print Network [OSTI]

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE Peter Cariani Eaton Peabody Laboratory@epl.meei.harvard.edu; www.cariani.com ABSTRACT One aspect of tonal consonance relevant to the pitch stability of chords and harmonic tension concerns the degree to which a collection of notes produces a unified, strong low pitch

Cariani, Peter

342

Social Choice Theory Decision Models with Multiple Criteria  

E-Print Network [OSTI]

Social Choice Theory Decision Models with Multiple Criteria Elise Bonzon 2013-2014 LIPADE / 39 Social Choice Theory #12;Social choice theory Social choice theory Research of a mechanism Choice Theory #12;Social choice theory Social choice theory Research of a mechanism (electoral system

Bonzon, Elise

343

Gary Feldman 1 Fermilab Workshop Multiple Measurements and  

E-Print Network [OSTI]

Gary Feldman 1 Fermilab Workshop Multiple Measurements and Parameters in the Unified Approach Gary Feldman Workshop on Confidence Limits Fermilab March 28, 2000 #12;Gary Feldman 2 Fermilab Workshop Origins Feldman 3 Fermilab Workshop Lack of Uniformly Most Powerful Test · Error of the first kind: Rejecting

Feldman, Gary

344

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci  

E-Print Network [OSTI]

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci Lee Altenberg altenber of the reduction principle is found: reduction results at individual loci combine topologically to produce to the reduction principle, and under fine tuning of mutation rates would be expected to have higher mutation rates

Altenberg, Lee

345

Development of a Public Key Infrastructure across Multiple Enterprises  

Science Journals Connector (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infra-structure among multiple ...

B. J. Desind; T. M. Sharick; J. P. Long; B. J. Wood

1997-06-01T23:59:59.000Z

346

Nonlinear voltages in multiple-lead coherent conductors  

Science Journals Connector (OSTI)

We use the generalized S-matrix approach to study multiple-lead coherent conductors in the case of finite applied voltages. In this framework we discuss the transverse voltage arising in a four-lead conductor with two symmetric biased leads.

Gordey B. Lesovik and Carlo Presilla

1993-01-15T23:59:59.000Z

347

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Impact in Multiple Unmanned Vehicle Supervisory Control. IEEE...Inverting the Operator/Vehicle Ratio: Approaches to Next...the Association for Unmanned Vehicle Systems International and Flight...592-600. Gibson J.J. The Ecological Approach to Visual Perception......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

348

Environmental Boundary Tracking and Estimation Using Multiple Autonomous Vehicles  

E-Print Network [OSTI]

and Andrea L. Bertozzi Abstract-- In this paper, we develop a framework for envi- ronmental boundary tracking from multiple sensing vehicles. For each vehicle, a tracking algorithm is developed based on Page, harmful algae blooms, wild fire spreading, temperature and salinity distribution in the ocean

Soatto, Stefano

349

RECENT FIELD EXPERIENCE WITH MULTIPLE COOPERATING SOLAR-POWERED AUVS  

E-Print Network [OSTI]

, the operator would typically observe which SAUV had the most energy reserve based on its acoustic status packets and decide to employ the one with the most energy reserve. The operator would then go through a set of enabling tools and technologies which allow us to test and evaluate multiple cooperating AUVs

350

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd  

E-Print Network [OSTI]

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd Dept. of Computer Science University of Calgary Calgary AB T2N 1N4 boyd@cpsc.ucalgary.ca Jean Meloche Department of StatisticsDonald and Owen [8] and Hall and Tit­ terington [6]. Similarly, Meloche and Zamar [9] and Boyd and Meloche [3

Boyd, Jeffrey E.

351

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom  

E-Print Network [OSTI]

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom President Spectral Applied Research (905 with CRESTech and the University of Waterloo, has developed a low-cost digital sun sensor for satellite attitude each field-of-view. The Sun is a nearly collimated source and produces a spot on the array via

Hornsey, Richard

352

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network [OSTI]

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model...

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

353

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE  

E-Print Network [OSTI]

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE David K McGookin Department://www.dcs.gla.ac.uk/~mcgookdk ABSTRACT In this paper work to improve upon the design of structured audio messages called Earcons for use in a concurrent spatialised audio environment is described. Issues involving the limitations of current Earcon

McGookin, David

354

ARM - Publications: Science Team Meeting Documents: Single and Multiple  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Single and Multiple scattering in optically thick multifractal clouds Single and Multiple scattering in optically thick multifractal clouds Grosdidier, Yves McGill University Lovejoy, Shaun McGill University Watson, Brian St. Lawrence University, Physics Department Schertzer, Daniel Ecole Nationale des Ponts et Chauss'es Satellite studies have shown that cloud radiances (at both visible and infra red wavelengths) are scale invariant over scales spanning much of the meteorologically significant range, and airborne lidar data have shown that vertical cross sections of passive scalar clouds are also scaling but with quite different exponents in the horizontal and vertical directions (quantified by an "elliptical dimension" = Del-23/9 close to the empirical value 2.55±0.02). This multifractality is the result of huge

355

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Richard Parker,. Parker Geoscience Consulting, LLC, Arvada, Colorado, USA; Zhiyue Xu and Claude Reed, Argonne National Laboratory, Argonne, Illinois, USA; Ramona Graves, Department of Petroleum Engineering, Colorado School of Mines, Golden, Colorado, USA; Brian Gahan and Samih Batarseh, Gas Technology Institute, Des Plaines, Illinois, USA ABSTRACT Studies on drilling petroleum reservoir rocks with lasers show that modern infrared lasers have the capability to spall (thermally fragment), melt and vaporize natural earth materials with the thermal spallation being the most efficient rock removal mechanism. Although laser irradiance as low as 1000 W/cm 2 is sufficient to spall rock, firing the

356

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: ADAS System Life Cycle Support, 2012-2015 Description: Subcontractor shall provide annual telephone support and hardware/software update support for the ARINC AIM alarm display and annunciation system (ADAS) security systems used at the SPR from 2012-2015. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment (categorical exclusions). (b) To find that a proposal is categorically excluded, DOE shall determine the following: (1) The proposed action fits within a class of actions that is listed in Appendix A or B of Subpart D;

357

Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing  

SciTech Connect (OSTI)

Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

Elder, J.; Vandekamp, R.

2011-02-10T23:59:59.000Z

358

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network [OSTI]

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative ...

Bacchetta, Alessandro; Radici, Marco; Signori, Andrea

2014-01-01T23:59:59.000Z

359

Self-organizing traffic lights at multiple-street intersections  

E-Print Network [OSTI]

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

360

Grouping Parts for Multiple Parts Production in Additive Manufacturing  

Science Journals Connector (OSTI)

Abstract Rapid prototyping (RP) has evolved to Additive Manufacturing (AM) in recent years. It can produce functional or end-use parts with small or even medium quantities. And further, due to its unique layer-by-layer construction principle, it can produce different parts at the same time in a same AM machine. To improve the productivity and machine utilization of AM processes under multiple parts production context, this paper propose the conception of ‘Grouping parts’. Based on the Group Technology (GT) used in traditional processing technologies, a modified Group Technology for AM under multiple parts manufacturing context is presented. To group parts, a set of key attributes affecting the AM production time, cost, quality and work preparation are identified to represent the parts, and then a Grey Clustering method is adopted to conduct the similarity analysis. A simple case study is presented in the end to illustrate the proposed conception and its methodology.

Yicha Zhang; Alain Bernard

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

An efficient parallel algorithm for matrix-vector multiplication  

SciTech Connect (OSTI)

The multiplication of a vector by a matrix is the kernel computation of many algorithms in scientific computation. A fast parallel algorithm for this calculation is therefore necessary if one is to make full use of the new generation of parallel supercomputers. This paper presents a high performance, parallel matrix-vector multiplication algorithm that is particularly well suited to hypercube multiprocessors. For an n x n matrix on p processors, the communication cost of this algorithm is O(n/[radical]p + log(p)), independent of the matrix sparsity pattern. The performance of the algorithm is demonstrated by employing it as the kernel in the well-known NAS conjugate gradient benchmark, where a run time of 6.09 seconds was observed. This is the best published performance on this benchmark achieved to date using a massively parallel supercomputer.

Hendrickson, B.; Leland, R.; Plimpton, S.

1993-03-01T23:59:59.000Z

362

Herbig AeBe stars: Multiplicity and consequences  

E-Print Network [OSTI]

By virtue of their young age and intermediate mass, Herbig AeBe stars represent a cornerstone for our understanding of the mass-dependency of both the stellar and planetary formation processes. In this contribution, I review the current state-of-the-art multiplicity surveys of Herbig AeBe stars to assess both the overall frequency of companions and the distribution of key orbital parameters (separation, mass ratio and eccentricity). In a second part, I focus on the interplay between the multiplicity of Herbig AeBe stars and the presence and properties of their protoplanetary disks. Overall, it appears that both star and planet formation in the context of intermediate-mass stars proceeds following similar mechanisms as lower-mass stars.

Duchene, Gaspard

2014-01-01T23:59:59.000Z

363

Dynamic evolutions of multiple toroidal Alfvén eigenmodes with energetic particles  

SciTech Connect (OSTI)

Kinetic simulations based on a reduced model are carried out to study dynamic evolutions of multiple toroidicity-induced shear Alfvén eigenmodes driven by energetic particles. It is found that passing and trapped particles play quite different roles on the mode evolution. For cases without background damping, passing particles lead to a longer linear growth phase and subsequent enhancement of the nonlinear saturation level when resonant regions with two modes are closely overlapped. On the other hand, trapped particles are mainly responsible for the persistent mode growth in the nonlinear phase. By comparing the results from anisotropic and isotropic simulations, it is suggested that passing particles have a negative impact on the mode development in the nonlinear phase. For the near marginal stability cases with large background damping, the upward and downward frequency chirping in multiple branches are significantly affected by the multi-mode interaction due to overlapping of hole and clump in the distribution function.

Zhu, J.; Ma, Z. W. [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China)] [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China); Fu, G. Y. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)] [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)

2013-12-15T23:59:59.000Z

364

Identification of Severe Multiple Contingencies in Electric PowerSystems  

SciTech Connect (OSTI)

In this work, we propose a computationally feasible approachtodetect severe multiple contingencies. We pose a contingency analysisproblem using a nonlinear optimization framework, which enables ustodetect the fewest possible transmission line outages resulting ina systemfailure of specified severity, and the most severe system failure causedby removing a specified number of transmission lines from service.Illustrations using a three bus system and the IEEE ~;30 bus system aimto exhibit the effectiveness of the proposed approach.

Donde, Vaibhav; Lopez, Vanessa; Lesieutre, Bernard; Pinar, Ali; Yang, Chao; Meza, Juan

2006-06-14T23:59:59.000Z

365

Multiple-state quantum Otto engine, 1D box system  

SciTech Connect (OSTI)

Quantum heat engines produce work using quantum matter as their working substance. We studied adiabatic and isochoric processes and defined the general force according to quantum system. The processes and general force are used to evaluate a quantum Otto engine based on multiple-state of one dimensional box system and calculate the efficiency. As a result, the efficiency depends on the ratio of initial and final width of system under adiabatic processes.

Latifah, E., E-mail: enylatifah@um.ac.id [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya, Indonesia and Physics Department, Malang State University (Indonesia); Purwanto, A. [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya (Indonesia)

2014-03-24T23:59:59.000Z

366

Code division multiple access signaling for modulated reflector technology  

DOE Patents [OSTI]

A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

Briles, Scott D. (Los Alamos, NM)

2012-05-01T23:59:59.000Z

367

Multiple-well testing in low permeability gas sands  

SciTech Connect (OSTI)

The purpose of this work was to determine the effect of various reservoir and well parameters in order to design a multiple-well pressure transient test to be conducted in low permeability, porosity, gas saturation, net pay thickness and well spacing. Long test times were found to be required for interference or pulse testing in low permeability gas reservoirs; however, the well spacing has been optimized. These calculations were made using two techniques: interference testing and pulse testing.

Bixel, H.; Carroll, H.B. Jr.; Crawley, A.

1980-10-01T23:59:59.000Z

368

Lenalidomide after Stem-Cell Transplantation for Multiple Myeloma  

Science Journals Connector (OSTI)

...survival. Lenalidomide maintenance may increase the time to progression in patients who do not have complete remission after induction therapy and transplantation, thus generating outcomes similar to those for patients with complete remission. Although the response criteria of the International Myeloma... A goal of therapy for multiple myeloma, to induce complete remission and prolong survival, is usually accomplished with combination therapy.1,2 Autologous hematopoietic stem-cell transplantation is often used after induction chemotherapy to improve the ...

McCarthy P.L.; Owzar K.; Hofmeister C.C.

2012-05-10T23:59:59.000Z

369

Multiple-scattering effects on smooth neutron-scattering spectra  

Science Journals Connector (OSTI)

Elastic and inelastic incoherent neutron-scattering experiments are simulated for simple models: a rigid solid (as used for normalization), a glass (with a smooth distribution of harmonic vibrations), and a viscous liquid (described by schematic mode-coupling equations). In cases where the input scattering law factorizes into a wave-number-dependent amplitude and a frequency-dependent spectral distribution, the latter is only weakly affected by multiple scattering, whereas the former is severely distorted.

Joachim Wuttke

2000-11-01T23:59:59.000Z

370

Optimal Power Sharing for Microgrid with Multiple Distributed Generators  

Science Journals Connector (OSTI)

Abstract This paper describes the active power sharing of multiple distributed generators (DGs) in a microgrid. The operating modes of a microgrid are 1) a grid-connected mode and 2) an autonomous mode. During islanded operation, one DG unit should share its output power with other DG units in exact accordance with the load. Unit output power control (UPC) is introduced to control the active power of DGs. The viability of the proposed power control mode is simulated by MATLAB/SIMULINK.

V. Logeshwari; N. Chitra; A. Senthil Kumar; Josiah Munda

2013-01-01T23:59:59.000Z

371

Multiple Compressions in the Middle Energy Plasma Focus Device  

Science Journals Connector (OSTI)

This paper reports some of the results that are aimed to investigate the neutron emission from the middle energy Mather?type plasma focus. These results indicated that with increase the pressure compression time is increase but there is not any direct relation between the compression time and neutron yield. Also it seems that multiple compression regimes is occurred in low pressure and single compression is appeared at higher pressure where is the favorable to neutron production.

H. R. Yousefi; Y. Ejiri; H. Ito; K. Masugata

2006-01-01T23:59:59.000Z

372

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments [OSTI]

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

373

Multiple Reference Fourier Transform Holography: Five Images for the Price  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Reference Fourier Transform Multiple Reference Fourier Transform Holography: Five Images for the Price of One Improving the quality of a high magnification image on an optical microscope is simply a matter of cranking up the intensity of the illumination lamp. The same is true for x-ray microscopes, but complications arise when there just aren't enough x-rays or even worse when the sample is susceptible to damage caused by the intense x-ray beam. To address these challenges we have demonstrated a novel technique for improving the quality of a microscopic image without increasing the x-ray exposure to the specimen. This affords new opportunities to explore materials prone to soft x-ray damage, like polymer or biological samples. Our technique uses coherent x-ray scattering to simultaneously acquire multiple images of a specimen, which can easily be combined later to enhance the image quality. Applying our technique in the weak illumination limit we imaged a nanoscale test object by detecting only 2500 photons.

374

Multiple reheat helium Brayton cycles for sodium fast reactors  

SciTech Connect (OSTI)

Sodium fast reactors (SFR) traditionally adopt the steam Rankine cycle for power conversion. The resulting potential for water-sodium reaction remains a continuing concern which at least partly delays the SFR technology commercialization and is a contributor to higher capital cost. Supercritical CO2 provides an alternative, but is also capable of sustaining energetic chemical reactions with sodium. Recent development on advanced inert-gas Brayton cycles could potentially solve this compatibility issue, increase thermal efficiency, and bring down the capital cost close to light water reactors. In this paper, helium Brayton cycles with multiple reheat and intercooling states are presented for SFRs with reactor outlet temperatures in the range of 510°C to 650°C. The resulting thermal efficiencies range from 39% and 47%, which is comparable with supercritical recompression CO2 cycles (SCO2 cycle). A systematic comparison between multiple reheat helium Brayton cycle and the SCO2 cycle is given, considering compatibility issues, plant site cooling temperature effect on plant efficiency, full plant cost optimization, and other important factors. The study indicates that the multiple reheat helium cycle is the preferred choice over SCO2 cycle for sodium fast reactors.

Haihua Zhao; Per F. Peterson

2008-07-01T23:59:59.000Z

375

V-125: Cisco Connected Grid Network Management System Multiple...  

Broader source: Energy.gov (indexed) [DOE]

System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco...

376

V-047: IBM Lotus Foundation Multiple Cross Site Scripting | Department...  

Broader source: Energy.gov (indexed) [DOE]

the malicious data is being viewed. 2) An error exists within the bundled version of PHP. IMPACT: Two vulnerabilities have been reported in IBM Lotus Foundations Start, which...

377

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

378

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production, and Tradeoffs at Landscape Scales  

E-Print Network [OSTI]

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production ECOSYSTEM SERVICES_ 4 o Modeling multiple ecosystem services, biodiversity conservation, commodity tradeoff between biodiversity conservation and J?l ecosystem services. Scenarios involving more development

Vermont, University of

379

Distribution of Four-Momentum Transfer in Multiple Meson Productions by High Energy Muons  

Science Journals Connector (OSTI)

......Multiple Meson Productions by High Energy Muons S. Higashi T. Kitamura Y. Mishima...Multiple Meson Productions by High Energy Muons S. Higashi, T. Kitamura, Y...production. Provided that the high energy muon-nucleon inter- actions occur......

S. Higashi; T. Kitamura; Y. Mishima; S. Miyamoto; H. Shibata; Y. Watase; K. Daiyasu; K. Kobayakawa; T. Murota; T. Nakano

1964-01-01T23:59:59.000Z

380

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network [OSTI]

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system...

Jittamai, Phongchai

2006-04-12T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Supersymmetric and Kaluza-Klein Particles Multiple Scattering in the Earth  

E-Print Network [OSTI]

http://en.wikipedia.org/wiki/Earth#Chemical composition [12]Multiple Scattering in the Earth The IceCube CollaborationMultiple Scattering in the Earth Ivone F. M. Albuquerque

Albuquerque, Ivone

2009-01-01T23:59:59.000Z

382

Automated metal-free multiple-column nanoLC for improved phosphopeptid...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

metal-free multiple-column nanoLC for improved phosphopeptide analysis sensitivity and throughput. Automated metal-free multiple-column nanoLC for improved phosphopeptide analysis...

383

Propagation models for multiple-antenna systems : methodology, measurements and statistics  

E-Print Network [OSTI]

The trend in wireless communications is towards utilization of multiple antenna systems. While techniques such as beam-forming and spatial diversity have been implemented for some time, the emergence of Multiple-Input ...

Herring, Keith, 1981-

2008-01-01T23:59:59.000Z

384

Low-coherence doppler lidar with multiple time coherence of reference and probe waves  

Science Journals Connector (OSTI)

The notion of multiple time coherence of optical beams is introduced and mathematically ... pulses (MFPs), which exhibit multiple time coherence, and the possibility of their application for ... is based on nanos...

G. G. Matvienko; S. N. Polyakov; V. K. Oshlakov

2007-11-01T23:59:59.000Z

385

GenomeCons: a web server for manipulating multiple genome sequence alignments and their consensus sequences  

Science Journals Connector (OSTI)

......December 2014 brief-report Applications Note GenomeCons: a web server for manipulating multiple genome sequence alignments and...molecular biological processes. In this study, we developed a web server, GenomeCons, for manipulating multiple genome sequence......

Tetsuya Sato; Mikita Suyama

2014-12-01T23:59:59.000Z

386

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...Reserved. April 2014 research-article Articles Multiple Nuclear Localization Signals...multiple conserved nuclear localization signals...sequence was analyzed for nuclear localization signals using the PSORTII program (51), which identifies...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

387

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...April 2014 research-article Articles Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor...Sequence analysis of AreA revealed multiple nuclear localization signals (NLSs), five putative...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

388

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

389

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodolog...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific...

390

E-Print Network 3.0 - aplastic anaemia multiple Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

multiple organ systems, especially in immunosuppressed patients. We Source: Steinbach, Joe Henry - Washington University Pain Center & Department of Anesthesiology, Washington...

391

Linear demultiple solution based on bottom-multiple generator (BMG) approximation: subsalt example  

E-Print Network [OSTI]

convolution of bpa with a0 ......................................... 29 3.7 An illustration of free-surface multiples not predicted in the two steps of the BMG demultiple technique. Note that these types of free-surface multiples are usually............................ 42 4.8 An example of the field of predicted free-surface multiples obtained from the multidimensional convolution of bpa with a 0...

Oladeinde, Abiola Omobolaji

2006-10-30T23:59:59.000Z

392

Microfluidic device for delivery of multiple inks for dip pen nanolithography  

E-Print Network [OSTI]

Microfluidic device for delivery of multiple inks for dip pen nanolithography Juan Alberto Rivas of a microfluidic ink delivery device for delivering multiple species of inks to an array of multiple pens, as well as for maximizing the number of inks for simulta- neous patterning by DPN. The microfluidic device called "Centiwell

Banerjee, Debjyoti

393

Fire-Balls in Pion Multiple Production: Brasil-Japan Collaboration of Chacaltaya Emulsion Chamber Experiment  

Science Journals Connector (OSTI)

......disc-shaped dense gas of mutually interacting...Fire-Balls zn Pion Multiple Production 3 dose not immediately...mechanism of multiple production of mesons is kept essentially...in comparison to its cost. Already in 1968...events of multiple pion production--into the two types......

Jose A. Chinellato; Carola Dobrigkeit; J. Bellandi Filho; Cesar M. G. Lattes; Marcio J. Menon; Carlos E. Navia O.; Ammiraju Pemmaraju; Kotaro Sawayanagi; Edison H. Shibuya; Armando Turtelli; Jr.; Neuza M. Amato; Naoyuki Arata; F. M. Oliveira Castro; Regina H. C. Maldonado; Hiroshi Aoki; Yoichi Fujimoto; Shunichi Hasegawa; Hiroshi Semba; Masanobu Tamada; Kojiro Tanaka; Seibun Yamashita; Toru Shibata; Kei Yokoi; Hiroshi Kumano; Akinori Ohsawa; Takaaki Tabuki

1983-03-01T23:59:59.000Z

394

V-001: Mozilla Security vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

395

DOE Designated User Facilities Multiple Laboratories * ARM Climate Research Facility  

Broader source: Energy.gov (indexed) [DOE]

Designated User Facilities Designated User Facilities Multiple Laboratories * ARM Climate Research Facility Argonne National Laboratory * Advanced Photon Source (APS) * Electron Microscopy Center for Materials Research * Argonne Tandem Linac Accelerator System (ATLAS) * Center for Nanoscale Materials (CNM) * Argonne Leadership Computing Facility (ALCF) * Brookhaven National Laboratory * National Synchrotron Light Source (NSLS) * Accelerator Test Facility (ATF) * Relativistic Heavy Ion Collider (RHIC) * Center for Functional Nanomaterials (CFN) * National Synchrotron Light Source II (NSLS-II ) (under construction) Fermi National Accelerator Laboratory * Fermilab Accelerator Complex Idaho National Laboratory * Advanced Test Reactor ** * Wireless National User Facility (WNUF)

396

Multiple piece turbine engine airfoil with a structural spar  

DOE Patents [OSTI]

A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.

Vance, Steven J. (Orlando, FL)

2011-10-11T23:59:59.000Z

397

Muon multiplicity at high energy proton-nuclei collisions  

E-Print Network [OSTI]

Estimation of multiplicity of muons and pions production at high energy proton-nuclei collisions is given. Both QED and QCD contributions are considered for peripheral kinematics of muon pair and $\\sigma$-meson production, keeping in mind it's final conversion to muons. An attempt to explain the excess of positive charged muons compared to negative one in cosmic muon showers is given. We derive the dependence of cross-section of $n$ pairs as a function of $n$ at large n as $d^n(n!n^2)^{-1}$.

E. A. Kuraev; S. Bakmaev; V. Bytev; E. Kokoulina

2007-06-29T23:59:59.000Z

398

Multiple thresholds in a model system of noisy ion channels  

Science Journals Connector (OSTI)

Voltage-activated ion channels vary randomly between open and closed states, influenced by the membrane potential and other factors. Signal transduction is enhanced by noise in a simple ion channel model. The enhancement occurs in a finite range of signals; the range can be extended using populations of channels. The range increases more rapidly in multiple-threshold channel populations than in single-threshold populations. The diversity of ion channels may thus be present as a strategy to reduce the metabolic costs of handling a broad class of electrochemical signals.

Michael J. Barber and Manfred L. Ristig

2006-10-19T23:59:59.000Z

399

Probing Aerogels by Multiple Quantum Filtered 131Xe NMR Spectroscopy  

Science Journals Connector (OSTI)

This is demonstrated in Figure 1 where four pulse sequences using multiple quantum filters are shown. ... Pyrex tube at 7.4 T, 1.2 MPa, and 298 K:? (a) double-quantum filtered pulse sequence, (b) magic-angle double-quantum filter which is a T2,±1 pulse sequence, (c) triple-quantum filtered sequence, and (d) triple-quantum filtered inversion recovery pulse sequence. ... 14-16 The tubes have been filled with aerogel fragments of a few millimeter diameter and were pressurized with xenon to about 6.9 MPa at 298 K to create supercritical conditions. ...

Thomas Meersmann; Michaël Deschamps; Geoffrey Bodenhausen

2001-01-13T23:59:59.000Z

400

Multiple Energy Exciton Shelves in Quantum-Dot–DNA Nanobioelectronics  

Science Journals Connector (OSTI)

The DNA molecules joining the QDs form an energetic bridge that provides an efficient conduction pathway for the different energy carriers, capturing the hot electron before it can cool to the bandedge via nonradiative relaxation. ... Interband optical excitation of PbSe NCs at low pump intensities, for which less than one exciton is initially generated per NC on average, results in the formation of two or more excitons (carrier multiplication) when pump photon energies are more than 3 times the NC band gap energy. ...

Samuel M. Goodman; Vivek Singh; Josep Casamada Ribot; Anushree Chatterjee; Prashant Nagpal

2014-10-24T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Multiple scattering approach to one?dimensional potential problems  

Science Journals Connector (OSTI)

By calculating the reflection and transmission coefficients for a square potential barrier in terms of a series of scatterings at step potential discontinuities a multiple scattering approach to potential problems is presented. This approach is applied to WKB potential problems by interpreting the WKB connection formulas in terms of reflection and transmission coefficients at each turning point. An algorithm for the systematic construction of the energy Green’s function is given. The significance of complex coordinate turning points is demonstrated. The equivalence of this approach and that of the Gaussian approximation of the path integral is mentioned briefly.

Arlen Anderson

1989-01-01T23:59:59.000Z

402

Magazine system for multiple sample transport from air into UHV  

Science Journals Connector (OSTI)

The time required to exchange specimens in a UHV system can be reduced considerably by a sample airlock. A low-cost sample exchange system is described which was originally constructed for an Auger spectrometer, but may be applied to other UHV systems as well. The essential parts are a magnetically coupled transfer rod, a magazine for the simultaneous transport of six samples, a bayonet clip to fix the samples sequentially to a carousel sample holder and a tilting mechanism in the specimen stage to bring the transferred samples into an optimum position for the further experiment. The system can be adapted to the multiple sample transport between two completely separated UHV systems.

W Pamler; W Reill; S Dorfner; K Roll

1985-01-01T23:59:59.000Z

403

Subdiffusive fluctuations of “pulled” fronts with multiplicative noise  

Science Journals Connector (OSTI)

We study the propagation of a “pulled” front with multiplicative noise that is created by a local perturbation of an unstable state. Unlike a front propagating into a metastable state, where a separation of time scales for sufficiently large t creates a diffusive wandering of the front position about its mean, we predict that for so-called pulled fronts, the fluctuations are subdiffusive with root mean square wandering ?(t)?t1/4, not t1/2. The subdiffusive behavior is confirmed by numerical simulations: For t<~600, these yield an effective exponent slightly larger than 1/4.

Andrea Rocco, Ute Ebert, and Wim van Saarloos

2000-07-01T23:59:59.000Z

404

Fine and Ultrafine Particle Decay Rates in Multiple Homes  

Science Journals Connector (OSTI)

All homes exchange indoor air with outdoor air at a certain base rate dependent on the construction quality of the home and on indoor–outdoor temperature and pressure differences. ... A number of multiple-home studies have measured indoor particle concentrations, but few have been able to determine the rates of particle removal for individual homes under normal living conditions. ... Therefore continuous measurements from this study of FP and UFP in 74 homes in Edmonton Canada were analyzed to determine these rates of removal in each home during week-long measurement periods in summer and winter. ...

Lance Wallace; Warren Kindzierski; Jill Kearney; Morgan MacNeill; Marie-Ève Héroux; Amanda J. Wheeler

2013-10-21T23:59:59.000Z

405

Multiple Time Scales in Diffraction Measurements of Diffusive Surface Relaxation  

Science Journals Connector (OSTI)

We grew SrTiO3 on SrTiO3(001) by pulsed laser deposition, using x-ray scattering to monitor the growth in real time. The time-resolved small-angle scattering exhibits a well-defined length scale associated with the spacing between unit-cell high surface features. This length scale imposes a discrete spectrum of Fourier components and rate constants upon the diffusion equation solution, evident in multiple exponential relaxation of the “anti-Bragg” diffracted intensity. An Arrhenius analysis of measured rate constants confirms that they originate from a single activation energy.

Aaron Fleet; Darren Dale; A. R. Woll; Y. Suzuki; J. D. Brock

2006-02-09T23:59:59.000Z

406

Formation control of multiple mobile robots utilising synchronisation approach  

Science Journals Connector (OSTI)

In this paper, a new synchronous control rule is proposed for multiple mobile robot trajectories tracking while maintaining time varying formation. Each robot is controlled to track the desired path while its motion is synchronised with the two neighbouring robots to perform and maintain a desired time-varying formation. The dynamic model of the wheeled mobile robot is derived and divided into a translational and rotational dynamic model. A new synchronous translational controller is proposed to guarantee the asymptotic stability of both position and synchronisation errors. A simulation result of 20 robots has been conducted to validate the effectiveness of the proposed synchronous controller in the time-varying formation tasks.

Ibrahim M.H. Sanhoury; Shamsudin H.M. Amin; Abdul Rashid Husain

2013-01-01T23:59:59.000Z

407

Development of a public key infrastructure across multiple enterprises  

SciTech Connect (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infrastructure among multiple enterprises when different applications and standards must be supported. This discussion chronicles the efforts by a team within the US Department of Energy`s Nuclear Weapons Complex to build a public key infrastructure and deploy applications that use it. The emphasis of this talk will be on the lessons learned during this effort and an assessment of the overall impact of this technology.

Sharick, T.M.; Long, J.P.; Desind, B.J. [and others

1997-05-01T23:59:59.000Z

408

Multiple description transform codes with an application to packetized speech  

E-Print Network [OSTI]

) and for 8 = 3. Comparison of the simulation and the theoretical results. 25 10 Multiple Description Transform Coder. Er, Ez, . . . , Et are ECMDSQ encoders for the transform coefficients, Dr, Dz, . . . , Dc are ECMDSQ decoders. 27 12 Slope A... of the location at which 21 lies). 7 11 10 12 13 15 16 17 21 14 18 20 22 26 19 23 25 27 31 24 28 29 30 32 33 34 Fig. 2. Example of index assignment, 2k + 1 = 5, As previously stated, the central encoder is described by a vector of thresholds (tp, tr...

Batllo, Jean-Christophe Claude

2012-06-07T23:59:59.000Z

409

Effects of the Spatial Extent of Multiple Harmonic Layers  

SciTech Connect (OSTI)

An analytic model for single particle motion in the presence of a wave field and multiple cyclotron harmonics is developed and investigated. The model suggests that even in the absence of Doppler broadening, cyclotron harmonic layers have finite spatial extent. This allows for particles to interact with more than one harmonic layer simultaneously, provided the layers are tightly packed. The latter phenomenon is investigated in the context of the model using symplectic mapping techniques. Then the model behavior is compared with numerical simulations of neutral beam particle trajectories in NSTX using the full-orbit code SPIRAL.

Burby, J. W.; Kramer, G. J.; Phillips, C. K.; Valeo, E. J. [Princeton Plasma Physics Laboratory, Princeton University, Princeton, NJ 08543 (United States)

2011-12-23T23:59:59.000Z

410

Carfilzomib, Lenalidomide, and Dexamethasone for Relapsed Multiple Myeloma  

Science Journals Connector (OSTI)

...there was a significant between-group difference in progression-free survival at the interim analysis, secondary end points were to be sequentially tested in the order of overall survival, overall response rate, and health-related quality of life, each at a one-sided significance level of 0.025. Efficacy... Survival rates have improved for patients with multiple myeloma, yet relapse remains common,1 indicating an ongoing need for new therapeutic approaches. The immunomodulatory agent lenalidomide in combination with high-dose dexamethasone is approved for ...

2014-12-06T23:59:59.000Z

411

A computed tomography implementation of multiple-image radiography  

SciTech Connect (OSTI)

Conventional x-ray computed tomography (CT) produces a single volumetric image that represents the spatially variant linear x-ray attenuation coefficient of an object. However, in many situations, differences in the x-ray attenuation properties of soft tissues are very small and difficult to measure in conventional x-ray imaging. In this work, we investigate an analyzer-based imaging method, called computed tomography multiple-image radiography (CT-MIR), which is a tomographic implementation of the recently proposed multiple-image radiography method. The CT-MIR method reconstructs concurrently three physical properties of the object. In addition to x-ray attenuation, CT-MIR produces volumetric images that represent the refraction and ultrasmall-angle scattering properties of the object. These three images can provide a rich description of the object's physical properties that are revealed by the probing x-ray beam. An imaging model for CT-MIR that is based on the x-ray transform of the object properties is established. The CT-MIR method is demonstrated by use of experimental data acquired at a synchroton radiation imaging beamline, and is compared to the pre-existing diffraction-enhanced imaging CT method. We also investigate the merit of an iterative reconstruction method for use with future clinical implementations of CT-MIR, which we anticipate would be photon limited.

Brankov, Jovan G.; Wernick, Miles N.; Yang Yongyi; Li Jun; Muehleman, Carol; Zhong Zhong; Anastasio, Mark A. [Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 and Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Rush University Medical Center, Chicago, Illinois 60616 (United States); National Synchrotron Light Source, Brookhaven National Laboratory, Upton, New York 11973 (United States); Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States)

2006-02-15T23:59:59.000Z

412

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network [OSTI]

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative aspects of hadron structure, opening important insights into the physics of spin, flavor and momentum structure of hadrons.

Alessandro Bacchetta; Miguel G. Echevarria; Marco Radici; Andrea Signori

2014-09-25T23:59:59.000Z

413

Hanford Technical Basis for Multiple Dosimetry Effective Dose Methodology  

SciTech Connect (OSTI)

The current method at Hanford for dealing with the results from multiple dosimeters worn during non-uniform irradiation is to use a compartmentalization method to calculate the effective dose (E). The method, as documented in the current version of Section 6.9.3 in the 'Hanford External Dosimetry Technical Basis Manual, PNL-MA-842,' is based on the compartmentalization method presented in the 1997 ANSI/HPS N13.41 standard, 'Criteria for Performing Multiple Dosimetry.' With the adoption of the ICRP 60 methodology in the 2007 revision to 10 CFR 835 came changes that have a direct affect on the compartmentalization method described in the 1997 ANSI/HPS N13.41 standard, and, thus, to the method used at Hanford. The ANSI/HPS N13.41 standard committee is in the process of updating the standard, but the changes to the standard have not yet been approved. And, the drafts of the revision of the standard tend to align more with ICRP 60 than with the changes specified in the 2007 revision to 10 CFR 835. Therefore, a revised method for calculating effective dose from non-uniform external irradiation using a compartmental method was developed using the tissue weighting factors and remainder organs specified in 10 CFR 835 (2007).

Hill, Robin L.; Rathbone, Bruce A.

2010-08-01T23:59:59.000Z

414

Multiple time step integrators in ab initio molecular dynamics  

SciTech Connect (OSTI)

Multiple time-scale algorithms exploit the natural separation of time-scales in chemical systems to greatly accelerate the efficiency of molecular dynamics simulations. Although the utility of these methods in systems where the interactions are described by empirical potentials is now well established, their application to ab initio molecular dynamics calculations has been limited by difficulties associated with splitting the ab initio potential into fast and slowly varying components. Here we present two schemes that enable efficient time-scale separation in ab initio calculations: one based on fragment decomposition and the other on range separation of the Coulomb operator in the electronic Hamiltonian. We demonstrate for both water clusters and a solvated hydroxide ion that multiple time-scale molecular dynamics allows for outer time steps of 2.5 fs, which are as large as those obtained when such schemes are applied to empirical potentials, while still allowing for bonds to be broken and reformed throughout the dynamics. This permits computational speedups of up to 4.4x, compared to standard Born-Oppenheimer ab initio molecular dynamics with a 0.5 fs time step, while maintaining the same energy conservation and accuracy.

Luehr, Nathan; Martínez, Todd J. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States) [Department of Chemistry, Stanford University, Stanford, California 94305 (United States); The PULSE Institute, Stanford University, Stanford, California 94305 (United States); SLAC National Accelerator Laboratory, Menlo Park, California 94025 (United States); Markland, Thomas E. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)] [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)

2014-02-28T23:59:59.000Z

415

Energetics of Multiple-Ion Species Hohlraum Plasmas  

SciTech Connect (OSTI)

A study of the laser-plasma interaction processes in multiple-ion species plasmas has been performed in plasmas that are created to emulate the plasma conditions in indirect drive inertial confinement fusion targets. Gas-filled hohlraums with densities of xe22/cc are heated to Te=3keV and backscattered laser light is measured by a suite of absolutely calibrated backscatter diagnostics. Ion Landau damping is increased by adding hydrogen to the CO2/CF4 gas fill. We find that the backscatter from stimulated Brillouin scattering is reduced is monotonically reduced with increasing damping, demonstrating that Landau damping is the controlling damping mechanism in ICF relevant high-electron temperature plasmas. The reduction in backscatter is accompanied by a comparable increase in both transmission of a probe beam and an increased hohlraum radiation temperature, showing that multiple-ion species plasmas improve the overall hohlraum energetics/performance. Comparison of the experimental data to linear gain calculations as well as detailed full-scale 3D laser-plasma interaction simulations show quantitative agreement. Our findings confirm the importance of Landau damping in controlling backscatter from high-electron temperature hohlraum plasmas and have lead to the inclusion of multi-ion species plasmas in the hohlraum point design for upcoming ignition campaigns at the National Ignition Facility.

Neumayer, P; Berger, R; Callahan, D; Divol, L; Froula, D; London, R; MacGowan, B J; Meezan, N; Michel, P; Ross, J S; Sorce, C; Widmann, K; Suter, L; Glenzer, S H

2007-11-05T23:59:59.000Z

416

Multiple models decentralized coordinated control of doubly fed induction generator  

Science Journals Connector (OSTI)

Abstract In this paper, a multiple model optimal tracking control (MOTC) design method for the double fed induction generator (DFIG) using correlative measured technique is proposed. The DFIG is represented by a third-order model, where electro-magnetic transients of stator are neglected. By using the correlative measured technique, the correlative measured matrix (CMM) of wind power system is obtained firstly. Then, a nonstandard state space equation of DFIG is obtained with the correlative measured vectors (CMVs), which reflect interactions between the \\{DFIGs\\} and grid. In order to cope with nonlinearities and continuous variation in the operating points, a multiple model design method is proposed in the discrete domain. The obtained control law, synthesized by using Bayesian probability, only depends on the local measured parameters. Hence, the MOTC can be regarded as a decentralized coordinated control, which can simplify the control structure and improve the transient stability of DFIG. To illustrate the effectiveness of the proposed MOTC strategy, simulations on a hybrid wind thermal power (HWTP) system are performed. The results show that the proposed MOTC strategy can provide acceptable performance throughout the whole operating region. Comparing to the conventional PID control, transient stability, damping, and fault ride-through capability of DFIG with the proposed MOTC design method have been improved effectively.

Yu-guang Niu; Xiao-ming Li; Zhong-wei Lin; Ming-yang Li

2015-01-01T23:59:59.000Z

417

Quantum Dot Solar Cells: High Efficiency through Multiple Exciton Generation  

SciTech Connect (OSTI)

Impact ionization is a process in which absorbed photons in semiconductors that are at least twice the bandgap can produce multiple electron-hole pairs. For single-bandgap photovoltaic devices, this effect produces greatly enhanced theoretical thermodynamic conversion efficiencies that range from 45-85%, depending upon solar concentration, the cell temperature, and the number of electron-hole pairs produced per photon. For quantum dots (QDs), electron-hole pairs exist as excitons. We have observed astoundingly efficient multiple exciton generation (MEG) in QDs of PbSe (bulk Eg = 0.28 eV), ranging in diameter from 3.9 to 5.7nm (Eg = 0.73, 0.82, and 0.91 eV, respectively). The effective masses of electron and holes are about equal in PbSe, and the onset for efficient MEG occurs at about three times the QD HOMO-LUMO transition (its ''bandgap''). The quantum yield rises quickly after the onset and reaches 300% at 4 x Eg (3.64 eV) for the smallest QD; this means that every QD in the sample produces three electron-hole pairs/photon.

Hanna, M. C.; Ellingson, R. J.; Beard, M.; Yu, P.; Micic, O. I.; Nozik, A. J.; c.

2005-01-01T23:59:59.000Z

418

Extramedullary progression of multiple myeloma despite concomitant medullary response to multiple combination therapies and autologous transplant: a case report  

E-Print Network [OSTI]

-line JOURNAL OF MEDICAL CASE REPORTS Kasi Loknath Kumar et al. Journal of Medical Case Reports 2014, 8:299 http://www.jmedicalcasereports.com/content/8/1/299Kansas City, KS, USA Full list of author information is available at the end of the articlesetting..., University of Kansas Medical Center,transplant: a case report Anup Kasi Loknath Kumar1*, Christopher Dakhil2, Megha Teeka Satyan1 and Nisreen Haideri3 Abstract Introduction: Extramedullary myeloma that occurs during the clinical course of multiple myeloma...

Kumar, Anup Kasi Loknarth; Dakhil, Christopher; Satyan, Megha Teeka; Haideri, Nisreen

2014-09-08T23:59:59.000Z

419

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Nicholas D. Benavides and Patrick L.Chapman  

E-Print Network [OSTI]

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Dymola Nicholas D not lend itself to many traditional circuit simulators such as SPICE. The state equations of a converter dependent on the states, and cannot be determined prior to simulation, requiring the use of an iterative

Chapman, Patrick

420

Building Design Advisor: Automated integration of multiple simulation tools K. Papamichael, J. LaPorta, H. Chauvet  

E-Print Network [OSTI]

LBNL-40591 Preprint Building Design Advisor: Automated integration of multiple simulation tools K Design Advisor (BDA) is a software environment that supports the integrated use of multiple analysis

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Alignement multiple Alignement multiple  

E-Print Network [OSTI]

GTTGGAGAAA AAGATCAATA TATTGCTTAT Borago CGATGCCGTT CCGGGAGAAG AAAATCAATA TATATGTTAT Heliotrop CGATCCCGTT

Csürös, Miklós

422

MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations  

Office of Legacy Management (LM)

52. 52. APR 9 1986 MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations International Minerals and Chemical Corporation P.O. Box 7047 Lakeland, Florida 33807 Dear Mr. Speir: The Department of Energy is evaluating the radiological condition of sites that were utilized by the Manhattan Engineer District and the Atomic Energy Commission (AEC) during the early years of nuclear energy development to determine whether they need remedial action and whether the Department has authority to perform such action. As you may be aware through previous correspondence, the International Minerals and Chemical Corporation facility in Mulberry, Florida, was identified as one such site, as a result of some research, development, and pilot plant work conducted at the

423

Quantum teleportation scheme by selecting one of multiple output ports  

E-Print Network [OSTI]

The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state, and (ii) the state is also optimized as well as Alice's measurement. We analytically determine the optimal protocols for all the four cases, and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of $N\\to\\infty$. The entanglement properties of the teleportation scheme are also discussed.

Satoshi Ishizaka; Tohya Hiroshima

2009-04-06T23:59:59.000Z

424

High-Yield Secretion of Multiple Client Proteins in Aspergillus  

SciTech Connect (OSTI)

Production of pure and high-yield client proteins is an important technology that addresses the need for industrial applications of enzymes as well as scientific experiments in protein chemistry and crystallization. Fungi are utilized in industrial protein production because of their ability to secrete large quantities of proteins. In this study, we engineered a high-expression-secretion vector, pEXPYR that directs proteins towards the extracellular medium in two Aspergillii host strains, examine the effect of maltose-induced over-expression and protein secretion as well as time and pH-dependent protein stability in the medium. We describe five client proteins representing a core set of hemicellulose degrading enzymes that accumulated up to 50-100 mg/L of protein. Using a recyclable genetic marker that allows serial insertion of multiple genes, simultaneous hyper-secretion of three client proteins in a single host strain was accomplished.

Segato, F.; Damasio, A. R. L.; Goncalves, T. A.; de Lucas, R. C.; Squina, F. M.; Decker, S. R.; Prade, R. A.

2012-07-15T23:59:59.000Z

425

Will multiple probes of dark energy find modified gravity?  

SciTech Connect (OSTI)

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w{sub 0}-w{sub a} plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Shapiro, Charles [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); Dodelson, Scott [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States); Department of Astronomy and Astrophysics, University of Chicago, Chicago, Illinois 60637 (United States); Kavli Institute for Cosmological Physics, Chicago, Illinois 60637 (United States); Hoyle, Ben [Institut de Ciencies del Cosmos, Barcelona (Spain); Samushia, Lado [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); National Abastumani Astrophysical Observatory, Ilia State University, 2A Kazbegi Ave, GE-0160 Tbilisi (Georgia); Flaugher, Brenna [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States)

2010-08-15T23:59:59.000Z

426

Non-invertibility of Multiple-Scattered QELSS Spectra  

E-Print Network [OSTI]

We consider the spectrum S(q,t) and field correlation function f(q,t) of light quasielastically scattered from diffusing optical probes in complex viscoelastic fluids. Relationships between the single-scattering f_1(q,t) and the multiple-scattering f_m(t) are examined. We show that it is fundamentally impossibly to invert f_m(t) to obtain f_1(q,t) or particle displacement moments , except with assumptions that are certainly not correct in complex, viscoelastic fluids. For diffusing dilute probes in viscoelastic fluids, f_1(q,t) is determined by all even moments , n > 0$, of the particle displacement X; this information is lost in f_m(t). In the special case of monodisperse probes in a true simple fluid, f_1(q,t) can be obtained from f_m(t), but only because the functional form of f_1(q,t) is already known.

George D. J. Phillies

2005-09-18T23:59:59.000Z

427

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network [OSTI]

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

428

Multiple-Coincidence Active Neutron Interrogation of Fissionable Materials  

SciTech Connect (OSTI)

Using a beam of tagged 14.1 MeV neutrons to probe for the presence of fissionable materials, we have measured n-?-? coincidences from depleted uranium (DU). The multiple coincidence rate is substantially above that measured from lead, tungsten, and iron. The presence of coincidences involving delayed gammas in the DU time spectra provides a signature for fissionable materials that is distinct from non-fissionable ones. In addition, the information from the tagged neutron involved in the coincidence gives the position of the fissionable material in all three dimensions. The result is an imaging probe for fissionable materials that is more compact and that produces much less radiation than other solutions.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham, and S.C. Wilde

2008-08-06T23:59:59.000Z

429

PLT scaling laws for thermonuclear fusion power multiplication  

SciTech Connect (OSTI)

While present experiments are evaluated on the basis of confinement time, it is the fusion power multiplication factor, Q, and the fusion power which will be the parameters that measure the performance of ignition experiments and fusion reactors. We have determined the relationship of Q to tau/sub E/ and the Lawson number, n tau/sub e/, for ohmically heated plasmas from the Princeton Large Tokamak (PLT). Q, tau/sub E/, and n tau/sub E/ all increase with density at low densities. Above anti n/sub e/ approx. = 4 x 10/sup 13/ cm/sup -3/, tau/sub Ee/ approx. = 30 msec, or anti n/sub e/ tau/sub Ee/ approx. = 1.5 x 10/sup 12/ cm/sup -3/s, Q saturates. Q scaling has also been obtained on PLT as a function of toroidal magnetic field, plasma current, and auxiliary heating power.

Grisham, L.R.; Strachan, J.D.

1982-11-01T23:59:59.000Z

430

Chapter 2 - Coal as Multiple Sources of Energy  

Science Journals Connector (OSTI)

Abstract Coal as multiple sources of energy is mined for its solid and gas-, oil-, and condensate-derived hydrocarbons as well as liquefied for synfuels. More than 50 countries mine coal as feedstock for power plants to generate electricity but only six of these countries monopolize 73% of the total recoverable coalbed gas resources of the world. Worldwide, about 30,000 coal mine explosions are caused by methane and carbon dioxide, and to prevent outbursts and emissions, underground, surface, and abandoned coalmine gases are exploited for industrial and commercial uses. Still, a large volume of unrecovered fugitive coalmine gases is released as global greenhouse gas emissions. An alternative source for foreign oil dependent countries is synfuels from coal liquefaction technology. Also, coal-derived hydrocarbons are a part of the conventional resources that is, gas, oil, and condensate sourced from coal but expelled into adjoining reservoirs, are attractive alternative energy sources.

Romeo M. Flores

2014-01-01T23:59:59.000Z

431

Charging system with galvanic isolation and multiple operating modes  

DOE Patents [OSTI]

Systems and methods are provided for operating a charging system with galvanic isolation adapted for multiple operating modes. A vehicle charging system comprises a DC interface, an AC interface, a first conversion module coupled to the DC interface, and a second conversion module coupled to the AC interface. An isolation module is coupled between the first conversion module and the second conversion module. The isolation module comprises a transformer and a switching element coupled between the transformer and the second conversion module. The transformer and the switching element are cooperatively configured for a plurality of operating modes, wherein each operating mode of the plurality of operating modes corresponds to a respective turns ratio of the transformer.

Kajouke, Lateef A.; Perisic, Milun; Ransom, Ray M.

2013-01-08T23:59:59.000Z

432

Multiple reentrant glass transitions in confined hard-sphere glasses  

E-Print Network [OSTI]

Glass forming liquids exhibit a rich phenomenology upon confinement. This is often related to the effects arising from wall-fluid interactions. Here we focus on the interesting limit where the separation of the confining walls becomes of the order of a few particle diameters. For a moderately polydisperse, densely packed hard-sphere fluid confined between two smooth hard walls, we show via event-driven molecular dynamics simulations the emergence of a multiple reentrant glass transition scenario upon a variation of the wall separation. Using thermodynamic relations, this reentrant phenomenon is shown to persist also under constant chemical potential. This allows straightforward experimental investigation and opens the way to a variety of applications in micro- and nanotechnology, where channel dimensions are comparable to the size of the contained particles. The results are in-line with theoretical predictions obtained by a combination of density functional theory and the mode-coupling theory of the glass transition.

S. Mandal; S. Lang; M. Gross; M. Oettel; D. Raabe; T. Franosch; F. Varnik

2014-06-20T23:59:59.000Z

433

Single transmission line interrogated multiple channel data acquisition system  

DOE Patents [OSTI]

A single transmission line interrogated multiple channel data acquisition system is provided in which a plurality of remote station/sensor circuits each monitors a specific process variable and each transmits measurement values over a single transmission line to a master interrogating station when addressed by said master interrogating station. Typically, as many as 330 remote stations may be parallel connected to the transmission line which may exceed 7,000 feet. The interrogation rate is typically 330 stations/second. The master interrogating station samples each station according to a shared, charging transmit-receive cycle. All remote station address signals, all data signals from the remote stations/sensors and all power for all of the remote station/sensors are transmitted via a single continuous terminated coaxial cable. A means is provided for periodically and remotely calibrating all remote sensors for zero and span. A provision is available to remotely disconnect any selected sensor station from the main transmission line.

Fasching, George E. (Morgantown, WV); Keech, Jr., Thomas W. (Morgantown, WV)

1980-01-01T23:59:59.000Z

434

Will multiple probes of dark energy find modified gravity?  

Science Journals Connector (OSTI)

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w0-wa plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Charles Shapiro; Scott Dodelson; Ben Hoyle; Lado Samushia; Brenna Flaugher

2010-08-17T23:59:59.000Z

435

Influence of heavy modes on perturbations in multiple field inflation  

SciTech Connect (OSTI)

We investigate linear cosmological perturbations in multiple field inflationary models where some of the directions are light while others are heavy (with respect to the Hubble parameter). By integrating out the massive degrees of freedom, we determine the multi-dimensional effective theory for the light degrees of freedom and give explicitly the propagation matrix that replaces the effective sound speed of the one-dimensional case. We then examine in detail the consequences of a sudden turn along the inflationary trajectory, in particular the possible breakdown of the low energy effective theory in case the heavy modes are excited. Resorting to a new basis in field space, instead of the usual adiabatic/entropic basis, we study the evolution of the perturbations during the turn. In particular, we compute the power spectrum and compare with the result obtained from the low energy effective theory.

Gao, Xian; Langlois, David [Astroparticule et Cosmologie (APC), UMR 7164-CNRS, Université Denis Diderot-Paris 7, 10 rue Alice Domon et Léonie Duquet, 75205 Paris (France); Mizuno, Shuntaro, E-mail: xgao@apc.univ-paris7.fr, E-mail: langlois@apc.univ-paris7.fr, E-mail: shuntaro.mizuno@th.u-psud.fr [Laboratoire de Physique Théorique, Université Paris-Sud 11 et CNRS, Bâtiment 210, 91405 Orsay Cedex (France)

2012-10-01T23:59:59.000Z

436

MULTIPLE SCATTERING POLARIZATION OF SUBSTELLAR-MASS OBJECTS: T DWARFS  

SciTech Connect (OSTI)

While there have been multiple observational programs aimed at detecting linear polarization of optical radiation emitted by ultracool dwarfs, there has been comparatively less rigorous theoretical analysis of the problem. The general expectation has been that the atmospheres of those substellar-mass objects with condensate clouds would give rise to linear polarization due to scattering. Because of rotation-induced non-sphericity, there is expected to be incomplete cancellation of disk-integrated net polarization and thus a finite polarization. For cloudless objects, however, only molecular Rayleigh scattering will contribute to any net polarization and this limit has not been well studied. Hence in this paper we present a detailed multiple scattering analysis of the polarization expected from those T-dwarfs whose spectra show absence of condensates. For this, we develop and solve the full radiative transfer equations for linearly polarized radiation. Only atomic and molecular Rayleigh scattering are considered to be the sources of polarization. We compute the local polarization at different angular directions in a plane-parallel atmosphere calculated for the range of effective temperatures of T dwarfs and then average over the whole surface of the object. The effects of gravity and limb darkening as well as rotation induced non-sphericity are included. It is found that the amount of polarization decreases with the increase in effective temperature. It is also found that significant polarization at any local point in the atmosphere arises only in the optical (B band). However, the disk integrated polarization-even in the B band-is negligible. Hence we conclude that, unlike the case for cloudy L dwarfs, polarization of cloudless T dwarfs by atomic and molecular scattering may not be detectable. In the future we will extend this work to cloudy L and T dwarf atmospheres.

Sengupta, Sujan [Indian Institute of Astrophysics, Koramangala 2nd Block, Bangalore 560 034 (India); Marley, Mark S., E-mail: sujan@iiap.res.i, E-mail: Mark.S.Marley@NASA.go [NASA Ames Research Center, MS-245-3, Moffett Field, CA 94035 (United States)

2009-12-10T23:59:59.000Z

437

Estimation of multi-particle correlation from multiplicity distribution observed in relativisitic heavy ion collisions  

E-Print Network [OSTI]

Analytical formula for multiplicity distribution is derived in the QO approach, where chaotic and coherent fields are contained. Observed charged multiplicity distributions in Au+Au collisions at $\\sqrt{s}=200$ AGeV and in pp collisions at $\\sqrt{s}=900$ GeV are analyzed by the formula. Chaoticity parameters in the inclusive events estimated from the analysis of multiplicity distributions are compared with those estimated from the analysis of observed two-particle inclusive identical particle correlations.

Naomichi Suzuki; Minoru Biyajima; Takuya Mizoguchi

2010-12-12T23:59:59.000Z

438

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

439

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

440

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Neutron generators with size scalability, ease of fabrication and multiple ion source functionalities  

DOE Patents [OSTI]

A neutron generator is provided with a flat, rectilinear geometry and surface mounted metallizations. This construction provides scalability and ease of fabrication, and permits multiple ion source functionalities.

Elizondo-Decanini, Juan M

2014-11-18T23:59:59.000Z

442

Multiple-beam laser–plasma interactions in inertial confinement fusion  

SciTech Connect (OSTI)

The experimental evidence for multiple-beam laser-plasma instabilities of relevance to laser driven inertial confinement fusion at the ignition scale is reviewed, in both the indirect and direct-drive approaches. The instabilities described are cross-beam energy transfer (in both indirectly driven targets on the NIF and in direct-drive targets), multiple-beam stimulated Raman scattering (for indirect-drive), and multiple-beam two-plasmon decay instability (in direct drive). Advances in theoretical understanding and in the numerical modeling of these multiple beam instabilities are presented.

Myatt, J. F., E-mail: jmya@lle.rochester.edu; Zhang, J.; Maximov, A. V. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Department of Mechanical Engineering, University of Rochester, Rochester, New York 14627 (United States); Short, R. W.; Seka, W.; Edgell, D. H.; Michel, D. T.; Igumenshchev, I. V. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Froula, D. H. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Department of Physics and Astronomy, University of Rochester, Rochester, New York 14627-0171 (United States); Hinkel, D. E.; Michel, P.; Moody, J. D. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, California 94551-0808 (United States)

2014-05-15T23:59:59.000Z

443

Hohlraum Symmetry Experiments with Multiple Beam Cones on the Omega Laser Facility  

SciTech Connect (OSTI)

Symmetry experiments have been performed on the Omega laser facility using cylindrical hohlraum targets with as many as 40thinspthinspbeams arranged into multiple beam cones. These experiments constitute a first step in the development of {open_quotes}beam phasing{close_quotes} in which beams are arranged into multiple beam cones, forming multiple rings of beam spots on the inner surface of a cylindrical hohlraum, and demonstrate the ability to model hohlraums incorporating multiple beam cones and to tune the time-integrated capsule flux asymmetry by adjustment of the beam pointing. {copyright} {ital 1998} {ital The American Physical Society}

Murphy, T.J.; Wallace, J.M.; Delamater, N.D.; Barnes, C.W.; Gobby, P.; Hauer, A.A.; Lindman, E.; Magelssen, G.; Moore, J.B.; Oertel, J.A.; Watt, R. [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)] [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States); Landen, O.L.; Amendt, P.; Cable, M.; Decker, C.; Hammel, B.A.; Koch, J.A.; Suter, L.J.; Turner, R.E.; Wallace, R.J. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States)] [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Marshall, F.J.; Bradley, D.; Craxton, R.S.; Keck, R.; Knauer, J.P.; Kremens, R.; Schnittman, J.D. [Laboratory for Laser Energetics, University of Rochester, Rochester, New York 14627 (United States)] [Laboratory for Laser Energetics, University of Rochester, Rochester, New York 14627 (United States)

1998-07-01T23:59:59.000Z

444

From Microevolutionary Processes to Macroevolutionary Patterns: Investigating Diversification at Multiple Scales in Southeast Asian Lizards  

E-Print Network [OSTI]

A comprehensive understanding of the evolutionary processes responsible for generating biodiversity is best obtained using integrative approaches at multiple scales. In doing so, these investigations can provide complex ...

Barley, Anthony John

2014-05-31T23:59:59.000Z

445

Accelerometry coherence analysis to assess balance strategies in patients with multiple sclerosis.  

E-Print Network [OSTI]

??Patients with multiple sclerosis often complain about reduced balance and have increased sway during quiet standing. However, thus far, no investigations have been conducted to… (more)

Veys, Christopher G.

2012-01-01T23:59:59.000Z

446

Indigenous climate knowledge in southern Uganda: the multiple components of a dynamic regional system  

E-Print Network [OSTI]

knowledge in southern Uganda: the multiple components of aAbstract Farmers in southern Uganda seek information toMakerere University, Kampala, Uganda A. Majugu Department of

Orlove, Ben; Roncoli, Carla; Kabugo, Merit; Majugu, Abushen

2010-01-01T23:59:59.000Z

447

CONTAINMENT EVALUATION OF PU-METAL TRANSPORT USING MULTIPLE BARRIERS  

SciTech Connect (OSTI)

A methodology was developed previously by SRNL to show that Al-SNF with cladding breaches can be directly transported in standard casks and maintained within the allowable release rates. This novel approach may be extended to other nuclear material systems. Utilizing an adaptation to the methodology, a containment analysis has been performed for the scenario of non-routine transfer of a damaged 9975 package containing plutonium metal from K-area monitored storage to F-area on the Savannah River Site. A multiple barrier system with each barrier having a defined leakage rate of less than 1 x 10{sup -3} cm{sup 3}/sec of air at Standard Temperature and Pressure was analyzed to determine the number of barriers needed to transport the package under normal transportation conditions to meet transportation requirements for containment. The barrier system was analyzed parametrically to achieve a composite system that met the federal requirements for the maximum permissible release rate. The multiple barrier system acts to retard the release of radioactivity. That is, a build-up in the radioactivity release rate occurs with time. For example, a system with three barriers (e.g., sealed plastic barrier) with a total free volume of 4,500 cm{sup 3} could be transported for a total time of up to approximately 10 days with a release rate within the permissible rate. Additional number of barriers, or volume of the barriers, or both, would extend to this period of time. For example, a system with seven barriers with a total free volume of 4,500 cm{sup 3} could be transported for up to 100 days. Plastic bags are one type of barrier used in movement of radioactive materials and capable of achieving a leak rate of 1 x 10{sup -3} cm{sup 3}/sec of air at STP. Low-density polyethylene bags can withstand high temperature (up to 180 C); a barrier thickness of 10 mils should be suitable for the barrier system.

Vinson, D.

2011-07-18T23:59:59.000Z

448

Containment analysis of the 9975 transportation package with multiple barriers  

SciTech Connect (OSTI)

A containment analysis has been performed for the scenario of non-routine transfer of a damaged 9975 package containing plutonium metal from K-area monitored storage to F-area on the Savannah River Site. A multiple barrier system with each barrier having a defined leakage rate of less than 1{times}10{sup {minus}3} cm{sup 3}/sec of air at Standard Temperature and Pressure was analyzed to determine the number of barriers needed to transport the package under normal transportation conditions to meet transportation requirements for containment. The barrier system was analyzed parametrically to achieve a composite system that met the federal requirements for the maximum permissible release rate given in Title 10 of the Code of Federal Regulations, Part 71. The multiple barrier system acts to retard the release of radioactivity. That is, a build-up in the radioactivity release rate occurs with time. For example, a system with three barriers (e.g., sealed plastic barrier) with a total free volume of 4,500 cm{sup 3} could be transported for a total time of up to approximately 10 days with a release rate within the permissible rate. Additional number of barriers, or volume of the barriers, or both, would extend to this period of time. For example, a system with seven barriers with a total free volume of 4,500 cm{sup 3} could be transported for up to 100 days. Plastic bags are one type of barrier used in movement of radioactive materials and capable of achieving a leak rate of 1{times}10{sup {minus}3} cm{sup 3}/sec of air at STP. Low-density polyethylene bags can withstand high temperature (up to 180 degrees C); a barrier thickness of 10 mils should be suitable for the barrier system. Additional requirements for barriers are listed in Section 4.2 of this report. Container testing per ANSI N14.5 is required to demonstrate leak rates for the individual barriers of less than 1{times}10{sup {minus}3} cm{sup 3}/sec.

Vinson, D.W.

2000-01-20T23:59:59.000Z

449

V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

14: RealPlayer MP4 Processing Buffer Overflow Vulnerability 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when processing MP4 files and can be exploited to cause a heap-based buffer overflow via a specially crafted MP4 file. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 16.0.1.18. Addthis Related Articles U-042: Mac RealPlayer Multiple Vulnerabilities V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

450

Two-phase flow characteristics in multiple orifice valves  

SciTech Connect (OSTI)

This work presents an experimental investigation on the characteristics of two-phase flow through multiple orifice valve (MOV), including frictional pressure drop and void fraction. Experiments were carried out using an MOV with three different sets of discs with throat thickness-diameter ratios (s/d) of 1.41, 1.66 and 2.21. Tests were run with air and water flow rates ranging between 1.0 and 3.0 m{sup 3}/h, respectively. The two-phase flow patterns established for the experiment were bubbly and slug. Two-phase frictional multipliers, frictional pressure drop and void fraction were analyzed. The determined two-phase multipliers were compared against existing correlations for gas-liquid flows. None of the correlations tested proved capable of predicting the experimental results. The large discrepancy between predicted and measured values points at the role played by valve throat geometry and thickness-diameter ratio in the hydrodynamics of two-phase flow through MOVs. A modification to the constants in the two-phase multiplier equation used for pipe flow fitted the experimental data. A comparison between computed frictional pressure drop, calculated with the modified two-phase multiplier equation and measured pressure drop yielded better agreement, with less than 20% error. (author)

Alimonti, Claudio [Sapienza University of Rome, Department ICMA, Via Eudossiana 18, 00184 Roma (Italy); Falcone, Gioia; Bello, Oladele [The Harold Vance Department of Petroleum Engineering, Texas A and M University, 3116 TAMU, Richardson Building, College Station, TX 77843 (United States)

2010-11-15T23:59:59.000Z

451

Multiple-relaxation-time lattice Boltzmann kinetic model for combustion  

E-Print Network [OSTI]

To probe both the Mechanical Non-Equilibrium (MNE) and Thermodynamic Non-Equilibrium (TNE) in the combustion procedure, a two-dimensional Multiple-Relaxation-Time (MRT) version of the Lattice Boltzmann Kinetic Model(LBKM) for combustion phenomena is presented. The chemical energy released in the progress of combustion is dynamically coupled into the system by adding a chemical term to the LB kinetic equation. The LB model is required to recover the Navier-Stokes equations with chemical reaction in the hydrodynamic limit. To that aim, we construct a discrete velocity model with $24$ velocities divided into $3$ groups. In each group a flexible parameter is used to control the size of discrete velocities and a second parameter is used to describe the contribution of the extra degrees of freedom. The current model works for both subsonic and supersonic flows with or without chemical reaction. In this model both the specific-heat ratio and the Prandtl number are flexible, the TNE effects are naturally presented in...

Xu, Aiguo; Zhang, Guangcai; Li, Yingjun

2014-01-01T23:59:59.000Z

452

Supporting Multiple Cognitive Processing Styles Using Tailored Support Systems  

SciTech Connect (OSTI)

According to theories of cognitive processing style or cognitive control mode, human performance is more effective when an individual’s cognitive state (e.g., intuition/scramble vs. deliberate/strategic) matches his/her ecological constraints or context (e.g., utilize intuition to strive for a "good-enough" response instead of deliberating for the "best" response under high time pressure). Ill-mapping between cognitive state and ecological constraints are believed to lead to degraded task performance. Consequently, incorporating support systems which are designed to specifically address multiple cognitive and functional states e.g., high workload, stress, boredom, and initiate appropriate mitigation strategies (e.g., reduce information load) is essential to reduce plant risk. Utilizing the concept of Cognitive Control Models, this paper will discuss the importance of tailoring support systems to match an operator's cognitive state, and will further discuss the importance of these ecological constraints in selecting and implementing mitigation strategies for safe and effective system performance. An example from the nuclear power plant industry illustrating how a support system might be tailored to support different cognitive states is included.

Tuan Q. Tran; Karen M. Feigh; Amy R. Pritchett

2007-08-01T23:59:59.000Z

453

Smart microgrid operational planning considering multiple demand response programs  

Science Journals Connector (OSTI)

Microgrid (MG) is one of the important blocks in the future smart distribution systems. The scheduling pattern of MGs affects distribution system operation. Also the optimal scheduling of MGs will result in reliable and economical operation of distribution system. In this paper an operational planning model of a MG which considers multiple demand response programs is proposed. In the proposed approach all types of loads can participate in demand response programs which will be considered in either energy or reserve scheduling. Also the renewable distributed generation uncertainty is covered by reserve provided by both Distributed Generations (DGs) and responsive loads. The novelty of this paper is the demand side participation in energy and reserve scheduling simultaneously. Furthermore the energy and reserve scheduling is proposed for day-ahead and real-time. The proposed model was tested on a typical MG system and the results show that running demand response programs will reduce total operation cost of MG and cause more efficient use of resources.

Alireza Zakariazadeh; Shahram Jadid

2014-01-01T23:59:59.000Z

454

Real-time multi-mode neutron multiplicity counter  

DOE Patents [OSTI]

Embodiments are directed to a digital data acquisition method that collects data regarding nuclear fission at high rates and performs real-time preprocessing of large volumes of data into directly useable forms for use in a system that performs non-destructive assaying of nuclear material and assemblies for mass and multiplication of special nuclear material (SNM). Pulses from a multi-detector array are fed in parallel to individual inputs that are tied to individual bits in a digital word. Data is collected by loading a word at the individual bit level in parallel, to reduce the latency associated with current shift-register systems. The word is read at regular intervals, all bits simultaneously, with no manipulation. The word is passed to a number of storage locations for subsequent processing, thereby removing the front-end problem of pulse pileup. The word is used simultaneously in several internal processing schemes that assemble the data in a number of more directly useable forms. The detector includes a multi-mode counter that executes a number of different count algorithms in parallel to determine different attributes of the count data.

Rowland, Mark S; Alvarez, Raymond A

2013-02-26T23:59:59.000Z

455

Pair-production multiplicities in rotation-powered pulsars  

E-Print Network [OSTI]

We discuss the creation of electron-positron cascades in the context of pulsar polar cap acceleration models and derive several useful analytic and semi-analytic results for the spatial extent and energy response of the cascade. Instead of Monte Carlo simulations, we use an integro- differential equation which describes the development of the cascade energy spectrum in one space dimension quite well, when it is compared to existing Monte Carlo models. We reduce this full equation to a single integral equation, from which we can derive useful results, such as the energy loss between successive generations of photons and the spectral index of the response. We find that a simple analytic formula represents the pair cascade multiplicity quite well, provided that the magnetic field is below 10^12 Gauss, and that an only slightly more complex formula matches the numerically-calculated cascade at all other field strengths. Using these results, we find that cascades triggered by gamma rays emitted through inverse Compton scattering of thermal photons from the neutron star's surface, both resonant and non-resonant, are important for the dynamics of the polar cap region in many pulsars.

J. A. Hibschman; J. Arons

2001-07-11T23:59:59.000Z

456

Testing String Material Selection in Environment with Multiple Deleterious Gases  

Science Journals Connector (OSTI)

Abstract While testing a deep exploratory well located in Bohai bay in China, a large amount of carbon dioxide (CO2), hydrogen sulfide (H2S) and carbon monoxide (CO) was detected unexpectedly. Being afraid of their corrosiveness and toxicity, testing work was terminated immediately. After tripped out, the string was found to have been eroded severely. In order to keep going the exploratory work, experiment was made to investigate corrosion rate of carbon steel in environment with multiple deleterious substances. A main purpose was to determine if carbon monoxide has a strong impact on anti-sulfide steel P110S, which is low-cost and has been widely used in sour wells. Experiment result indicates that carbon monoxide has no obvious influence on corrosion rate in circumstances that carbon dioxide and hydrogen sulfide exist. Comprehensive studies show that P110S tubing can be used as testing string to carry out down-hole work. These results eliminated worries of decision-makers.

Gao Baokui; Qin Xing; Wang Wei

2014-01-01T23:59:59.000Z

457

Probing Radiation Damage in Plutonium Alloys with Multiple Measurement Techniques  

SciTech Connect (OSTI)

A material subjected to radiation damage will usually experience changes in its physical properties. Measuring these changes in the physical properties provides a basis to study radiation damage in a material which is important for a variety of real world applications from reactor materials to semiconducting devices. When investigating radiation damage, the relative sensitivity of any given property can vary considerably based on the concentration and type of damage present as well as external parameters such as the temperature and starting material composition. By measuring multiple physical properties, these differing sensitivities can be leveraged to provide greater insight into the different aspects of radiation damage accumulation, thereby providing a broader understanding of the mechanisms involved. In this report, self-damage from {alpha}-particle decay in Pu is investigated by measuring two different properties: magnetic susceptibility and resistivity. The results suggest that while the first annealing stage obeys second order chemical kinetics, the primary mechanism is not the recombination of vacancy-interstitial close pairs.

McCall, S K; Fluss, M J; Chung, B W

2010-04-21T23:59:59.000Z

458

Mixed non-Gaussianity in multiple-DBI inflation  

SciTech Connect (OSTI)

We study a model of multiple-field DBI inflation leading to mixed form of primordial non-Gaussianity, including equilateral and local bispectrum shapes. We present a general formalism based on the Hamilton-Jacobi approach, allowing us to go beyond slow-roll, combining the three-point function for the fields at Hubble-exit with the non-linear evolution of super-Hubble scales. We are able to obtain analytic results by taking a separable Ansatz for the Hubble rate. We find general expressions for both the equilateral and local type non-Gaussianity parameter f{sub NL}. The equilateral non-Gaussianity includes the usual enhancement for small sound speeds, but multiplied by an analytic factor which can lead to a suppression. We illustrate our results with two scenarios. In the first model, previously found to have detectable local non-Gaussianity, we find that the equilateral signal is not sufficiently suppressed to evade current observational bounds. In our second scenario we construct a model which exhibits both a detectable equilateral f{sub NL} and a negative local f{sub NL}.

Emery, Jon; Tasinato, Gianmassimo; Wands, David, E-mail: jon.emery@port.ac.uk, E-mail: gianmassimo.tasinato@port.ac.uk, E-mail: david.wands@port.ac.uk [Institute of Cosmology and Gravitation, University of Portsmouth, Dennis Sciama Building, Portsmouth, PO1 3FX (United Kingdom)

2013-05-01T23:59:59.000Z

459

Detection and track of a stochastic target using multiple measurements  

SciTech Connect (OSTI)

The authors are interested in search and tracking problems. In a search, the target might be located among a number of hiding places. Multiple measurements from various locations might be used to determine the likelihood that a particular hiding place is occupied. An obvious example would be a search for a weak radiation source in a building. Search teams might make many measurements with radiation detectors and analyze this data to determine likely areas for further searching. In this paper the authors present a statistical interpretation of the implications of measurements made on a stochastic system, one which makes random state transitions with known average rates. Knowledge of the system is represented as a statistical ensemble of instances which accord with measurements and prior information. The evolution of ratios of populations in this ensemble due to measurements and stochastic transitions may be calculated efficiently. Applied to target detection and tracking, this approach allows a rigorous definition of probability of detection and probability of false alarm and reveals a computationally useful functional relationship between the two. An example of a linear array of simple counters is considered in detail. For it, accurate analytic approximations are developed for detection and tracking statistics as functions of system parameters. A single measure of effectiveness for individual sensors is found which is a major determinant of system performance and which would be useful for initial sensor design.

Cunningham, C.T.

1995-11-01T23:59:59.000Z

460

Sparse matrix-vector multiplication on a reconfigurable supercomputer  

SciTech Connect (OSTI)

Double precision floating point Sparse Matrix-Vector Multiplication (SMVM) is a critical computational kernel used in iterative solvers for systems of sparse linear equations. The poor data locality exhibited by sparse matrices along with the high memory bandwidth requirements of SMVM result in poor performance on general purpose processors. Field Programmable Gate Arrays (FPGAs) offer a possible alternative with their customizable and application-targeted memory sub-system and processing elements. In this work we investigate two separate implementations of the SMVM on an SRC-6 MAPStation workstation. The first implementation investigates the peak performance capability, while the second implementation balances the amount of instantiated logic with the available sustained bandwidth of the FPGA subsystem. Both implementations yield the same sustained performance with the second producing a much more efficient solution. The metrics of processor and application balance are introduced to help provide some insight into the efficiencies of the FPGA and CPU based solutions explicitly showing the tight coupling of the available bandwidth to peak floating point performance. Due to the FPGA's ability to balance the amount of implemented logic to the available memory bandwidth it can provide a much more efficient solution. Finally, making use of the lessons learned implementing the SMVM, we present an fully implemented nonpreconditioned Conjugate Gradient Algorithm utilizing the second SMVM design.

Dubois, David H [Los Alamos National Laboratory; Dubois, Andrew J [Los Alamos National Laboratory; Boorman, Thomas M [Los Alamos National Laboratory; Connor, Carolyn M [Los Alamos National Laboratory; Poole, Steve [ORNL

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Multiple crossbar network: A switched high-speed local network  

SciTech Connect (OSTI)

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

462

Certification of Plutonium Standards for KAMS Neutron Multiplicity Counter  

SciTech Connect (OSTI)

As part of the implementation of the PEIS record of decision in January of 1997, DOE will pursue two technologies to disposition fifty metric tons of its stockpile of plutonium. As a result of this and in order to expedite the closure of Rocky Flats Environmental Technology Site in Colorado, DOE decided to use existing facilities at the Savannah River Site (SRS) for storing all material containing plutonium at KAMS. A neutron multiplicity counter was designed and built to carry out receipt verification measurement at the facility. Since the material covers a wide range and different levels of impurities, it is essential that we obtain a set of working standards. An agreement was drafted to select the first drums to be these standards. A plan was developed for the certification of these standards using Rocky Flat's existing nondestructive assay equipment. This paper will discuss the types of materials to be shipped to SRS, number of standards to certify for each type of material, and the certification plan. It will also discuss the activities necessary to determine the nuclear content of these working standards to be used at SRS facilities in support of shipment and receipt of the Pu containing materials. Definition of instrument qualifications, measurement control processes, measurement methodologies, and calculations necessary to report the gram quantities and their uncertainties for plutonium, americium-241, uranium-235 (if present) and neptunium-237 (if present) will also be presented.

Salaymeh, S.R.

2002-05-31T23:59:59.000Z

463

Inter-rack Live Migration of Multiple Virtual Machines Umesh Deshpande, Unmesh Kulkarni, and Kartik Gopalan  

E-Print Network [OSTI]

Inter-rack Live Migration of Multiple Virtual Machines Umesh Deshpande, Unmesh Kulkarni, and Kartik a distributed system for inter-rack live migration (IRLM), i.e., parallel live migration of multiple VMs across racks. The key performance objective of IRLM is to reduce the traffic load on the core network links

Gopalan, Kartik

464

Multiple-objective Scheduling for the Hierarchical Control of Flexible Manufacturing Cells  

E-Print Network [OSTI]

Multiple-objective Scheduling for the Hierarchical Control of Flexible Manufacturing Cells (Revised level controller employs a combined priority rule to rank shop orders considering multiple scheduling the detailed schedule with projected order completion times back to the shop controller. Upon receiving

Nagi, Rakesh

465

Faster Algorithms for Optimal Multiple Sequence Alignment Based on Pairwise Comparisons  

E-Print Network [OSTI]

Faster Algorithms for Optimal Multiple Sequence Alignment Based on Pairwise Comparisons Pankaj K algorithm more efficient, while still finding an optimal solution under these restrictions. Namely, in our) algorithms compute an optimal Multiple Sequence Alignment for a wide range of scoring functions. In 1970

Kolodny, Rachel

466

On the Performance of Energy-Division Multiple Access with Regular Constellations  

Science Journals Connector (OSTI)

In this paper we describe a multiple-access protocol in which different users are assumed to share the same bandwidth and the same pulse. Users employ the same modulation (binary-phase shift keying, quadrature-phase shift keying, and rectangular-phase ... Keywords: Amplitude modulation, Bit error rate, Multiple access, Normalized throughput, Successive decoding

Pierluigi Salvo Rossi; Gianmarco Romano; Francesco Palmieri

2012-05-01T23:59:59.000Z

467

Efficient Implementation of Polynomial Arithmetic in a Multiple-Level Programming  

E-Print Network [OSTI]

Efficient Implementation of Polynomial Arithmetic in a Multiple-Level Programming Environment Xin-level programming environment. We are interested in the integration of polynomial data type implementations realized of this study is to investigate implementation techniques for polynomial arithmetic in a multiple

Moreno Maza, Marc

468

A study of information dissemination under multiple random walkers and replication mechanisms  

Science Journals Connector (OSTI)

Random walk-based approaches are suitable for information dissemination in mobile and opportunistic environments that are inherently dynamic and typically large-scale. Multiple random walkers have been proposed in the recent past as a suitable ... Keywords: coverage, dissemination and replication techniques, multiple random walkers

Konstantinos Oikonomou; Dimitrios Kogias; Ioannis Stavrakakis

2010-02-01T23:59:59.000Z

469

Multiple paternity in Asclepias syriaca using a paired-fruit analysis  

E-Print Network [OSTI]

Multiple paternity in Asclepias syriaca using a paired-fruit analysis Julie J. Gold and Joel S. Shore Introduction Abstract: We investigated the extent of multiple paternity within and between fruits within fruits. When pairs of fruits obtained from individual ramets were analyzed in a similar manner

Shore, Joel S.

470

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where describe Clique-Based Randomized Multiple Access (CRMA), a distributed MAC protocol for wireless ad hoc

471

10.1098/rsta.2001.0955 Multiple-relaxation-time lattice Boltzmann  

E-Print Network [OSTI]

10.1098/rsta.2001.0955 Multiple-relaxation-time lattice Boltzmann models in three dimensions-relaxation-time lattice Boltzmann equation, with examples of 15-velocity and 19-velocity models in three dimensions Boltzmann equation over the popular lattice Bhatnagar{Gross{Krook equation. Keywords: multiple

Luo, Li-Shi

472

POSTER(1) POSTER(1) poster -Scale and tile a postscript image to print on multiple pages  

E-Print Network [OSTI]

POSTER(1) POSTER(1) NAME poster - Scale and tile a postscript image to print on multiple pages SYNOPSIS poster infile DESCRIPTION Poster can be used to create a large poster by building multiple pages together building the poster. The output pages bear cutmarks and have slightly overlapping

Read, Charles

473

Ionospheric local model and climatology from long-term databases of multiple incoherent scatter radars  

E-Print Network [OSTI]

Ionospheric local model and climatology from long-term databases of multiple incoherent scatter and climatology from long-term databases of multiple incoherent scatter radars, Geophys. Res. Lett., 32, L20102 to ionospheric and ther- mospheric climatology. The altitude dependence, for in- stance, of various variations

474

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks  

E-Print Network [OSTI]

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks Yuzhen is of paramount importance. Energy-efficient routing trees built for in-network pro- cessing play a central role multiple routing trees in sensor networks for the evaluation of a class of aggre- gate queries including

Liang, Weifa

475

On the generating function of weight multiplicities for the representations of the Lie algebra $C_2$  

E-Print Network [OSTI]

We use the generating function of the characters of $C_2$ to obtain a generating function for the multiplicities of the weights entering in the irreducible representations of that simple Lie algebra. From this generating function we derive some recurrence relations among the multiplicities and a simple graphical recipe to compute them.

José Fernández Nuñez; Wifredo Garc'\\ia Fuertes; Askold M. Perelomov

2014-05-12T23:59:59.000Z

476

A Game Theoretical Study of Cooperative Advertising with Multiple Retailers in a Distribution Channel  

E-Print Network [OSTI]

1 A Game Theoretical Study of Cooperative Advertising with Multiple Retailers in a Distribution. Beijing 100084, China Abstract Extant studies of cooperative advertising mainly consider a single advertising decisions. Based on the quantitative results, it is observed that: 1) When there are multiple

Xie, Jinxing

477

Multiple cross-docks scheduling using two meta-heuristic algorithms  

Science Journals Connector (OSTI)

This paper considers a truck scheduling problem in a multiple cross docks while there is temporary storage in front of the shipping docks. Receiving and shipping trucks can intermittently move in and out of the docks during the time intervals between ... Keywords: Experimental design, Firefly algorithm, Multiple cross-docks scheduling, Simulated annealing

Mansooreh Madani-Isfahani, Reza Tavakkoli-Moghaddam, Bahman Naderi

2014-08-01T23:59:59.000Z

478

Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow-gate Rights  

E-Print Network [OSTI]

PWP-076 Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow.ucei.berkeley.edu/ucei #12;Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow-gate Rights- mission use. The North American Electric Reliability Council NERC is in the process of implementing

California at Berkeley. University of

479

Incorporating Multiple cDNA Microarray Slide Scans -Application to Somatic Embryogenesis in Maize  

E-Print Network [OSTI]

Incorporating Multiple cDNA Microarray Slide Scans -Application to Somatic Embryogenesis in Maize 1 the measurements of gene expression. Because `optimal' settings may vary from slide to slide, operators typically scan each slide multiple times and then choose the reading with the fewest over-exposed and under

480

Multiplication of Distributions in one dimension: possible approaches and applications to $?$-function and its derivatives  

E-Print Network [OSTI]

We introduce a new class of multiplications of distributions in one dimension merging together two different regularizations of distributions. Some of the features of these multiplications are discussed in a certain detail. We use our theory to study a certain number of examples, involving products between Dirac delta functions and its successive derivatives.

F. Bagarello

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A construct of internal multiples from surface data only: the concept of virtual seismic events  

Science Journals Connector (OSTI)

......another reason why the iterative process described in Figs 12 and 13...multiples During the review process for this paper, an internal-multiple...suggestions during the review process. References 1 Berkhout A...only: 74th Annual Internat. Mtg., Soc. Expl. Geophys......

Luc T. Ikelle

2006-02-01T23:59:59.000Z

482

A family of multiple sub-filters based acoustic echo cancellers  

Science Journals Connector (OSTI)

In this paper, a multiple sub-filter (MSF) approach is discussed in which, a single long filter (SLF) is partitioned into multiple subfilters to achieve fast convergence rate. The performance of the MSF parallel structure adaptation is studied for common ... Keywords: MSF, acoustic echo, adaptive filter, echo cancellation

Alaka Barik; Tarkeshwar P. Bhardwaj; Ravinder Nath

2010-12-01T23:59:59.000Z

483

Energy Efficient Control of a Boosting System with Multiple Variable-Speed Pumps in Parallel  

E-Print Network [OSTI]

with multiple variable-speed pumps in parallel is to minimize the pump system energy consumption by controlEnergy Efficient Control of a Boosting System with Multiple Variable-Speed Pumps in Parallel Zhenyu. The experimental results show a huge potential to improve the energy efficiency of multi-pump systems using

Yang, Zhenyu

484

Intersubband absorption in boron-doped multiple Ge quantum dots J. L. Liu,a)  

E-Print Network [OSTI]

Intersubband absorption in boron-doped multiple Ge quantum dots J. L. Liu,a) W. G. Wu, A. Balandin; accepted for publication 3 November 1998 The intersubband absorption in self-assembled boron-doped multiple and undoped Si barriers. The infrared absorption as a function of wavelength is measured by Fourier transform

485

Resonant normal-incidence separate-absorption-charge-multiplication Ge/Si avalanche  

E-Print Network [OSTI]

-speed InP /InGaAsP /InGaAs avalanche photodiodes grown by chemical beam epitaxy," IEEE J. Quantum ElectronResonant normal-incidence separate-absorption- charge-multiplication Ge/Si avalanche photodiodes the impedance of separate-absorption-charge- multiplication Ge/Si avalanche photodiodes (APD) is characterized

Bowers, John

486

ALLAN, VERBEEK: RANKING USER-ANNOTATED IMAGES 1 Ranking user-annotated images for multiple  

E-Print Network [OSTI]

, for example, the user enters the search terms `cat' and `dog', we can quickly find potentially-relevant images, and that performance when searching for multiple terms can be increased by learning a new combined model and taking be increased by rejecting images from `untrustwor- thy' users. We focus on search queries for multiple terms

Paris-Sud XI, Université de

487

A multiple temperature kinetic model and its application to micro-scale gas flow simulations  

E-Print Network [OSTI]

A multiple temperature kinetic model and its application to micro-scale gas flow simulations model, micro-scale flows. 1. Introduction Gas flows can be classified according to the flow regimes_pku@yahoo.com.cn Abstract This paper presents a numerical approach to solve the multiple temperature kinetic model (MTKM

Xu, Kun

488

False Discovery Control in Large-Scale Spatial Multiple Wenguang Sun  

E-Print Network [OSTI]

is one of the six criteria pollutants regulated by the US EPA under the Clean Air Act and has been linkedFalse Discovery Control in Large-Scale Spatial Multiple Testing Wenguang Sun University of Southern and computational framework for false discovery control in multiple testing of spatial signals. We consider both

Cai, T. Tony

489

Audio watermarking with high embedding capacity based on multiple access techniques  

Science Journals Connector (OSTI)

Abstract This paper deals with a new digital audio watermarking scheme based on multiple access techniques. In digital communication, multiple access techniques allow several users transmissions by taking the same communication channel. The present work proposes to embed multiple sub-watermarks in the same channel that is the audio signal. Our main objective is to investigate embedding capacity (the amount of information that can be hidden) limitations of our proposed audio watermarking system. Three multiple access techniques have been employed in the new multi-watermarking system: DS-CDMA (Direct-Sequence Code Division Multiple Access), FHMA (Frequency Hopped Multiple Access) and FDMA (Frequency Division Multiple Access). Experimental results allow us to make the choice on the best multiple access technique, in the multi-watermarking system, which significantly permits the highest embedding capacity (a data embedding rate up to 6 kb/s) with almost no loss of data imperceptibility and with acceptable extraction fidelity ( BER ? 10 ? 2 ) even in presence of disturbances.

Mohammed Khalil; Abdellah Adib

2014-01-01T23:59:59.000Z

490

Speech enhancement based on Sparse Code Shrinkage employing multiple speech models  

Science Journals Connector (OSTI)

This paper presents a single-channel speech enhancement system based on the Sparse Code Shrinkage (SCS) algorithm and employment of multiple speech models. The enhancement system consists of two stages: training and enhancement. In the training stage, ... Keywords: Clustering, Gaussian mixture model (GMM), Independent Component Analysis, Multiple models, Sparse Code Shrinkage, Speech enhancement, Super-Gaussian distribution

Peter Jan?Ovi?; Xin Zou; MüNevver KöKüEr

2012-01-01T23:59:59.000Z

491

File:BOEMRE atlantic.OCS.multiple.use.map.2003.pdf | Open Energy  

Open Energy Info (EERE)

atlantic.OCS.multiple.use.map.2003.pdf atlantic.OCS.multiple.use.map.2003.pdf Jump to: navigation, search File File history File usage Multiple Uses of the Atlantic Outer Continental Shelf Size of this preview: 550 × 600 pixels. Full resolution ‎(4,958 × 5,408 pixels, file size: 3.06 MB, MIME type: application/pdf) Description Multiple Uses of the Atlantic Outer Continental Shelf Sources Bureau of Ocean Energy Management, Regulation and Enforcement (BOEMRE) Related Technologies Offshore wind Creation Date 2003-10 Extent Northeast coast of US Countries United States UN Region Northern America States Maryland, Delaware, New Jersey, New York, Connecticut, Rhode Island, Massachusetts Map published in October 2003 by the BOEMRE illustrating multiple uses of the outer continental shelf of the Atlantic Ocean, in the region between

492

A Multiple-Channel Sub-Band Transient Detection System  

SciTech Connect (OSTI)

We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of the pairs exhibit dispersion characteristic of skywave propagation via refraction from the ionosphere. The maximum line-of-sight observation range for radio propagation extends as far as 300 km for a source at an altitude of 5 km, and 520 km for a source at 15 km. Refraction from the ionosphere, however, may allow HF radiation to propagate around the globe. Information about the times and locations of sources, in conjunction with regional, weather maps and computer models of ionospheric propagation, suggest that some SIPP events originate in the vicinity of large-scale thunderstorm complexes.

David A. Smith

1998-11-01T23:59:59.000Z

493

Multiple system atrophies: A neuropathological and neurochemical study  

Science Journals Connector (OSTI)

The 5 familial cases which are reported here, showed a similar clinical course characterized by an early onset and a very long duration provided adequate nursing care was available. The main features were a very prominent pyramidal syndrome, less pronounced or partially masked cerebellar, myoclonic and extrapyramidal syndromes and preterminal sphincter disturbances which accounted for feeding difficulties, malnutrition and infections. Epilepsy was not infrequent but its management was possible with modest does of antiepileptic drugs. Investigations during life are helpful in ruling out some lipidoses such as metachromatic leucodystrophy, but they did not give any useful evidence as to pathogenesis. If one accepts an autosomal recessive inheritance (this is not completely certain), it is clear that neither clinical examination nor investigations are at present helpful in the detection of heterozygotes. The main pathological findings were multiple system atrophies and leucodystrophy. The system atrophies were qualitatively similar to those found in the classical spinocerebellar degenerations but they were much more widespread above the spinal level. The constellation of optic, thalamic, pontine, olivary, pyramidal and other long-tract lesions, among which the thalamic degeneration was unusually pronounced, appears to be unique among the abiotrophic processes. The second major pathological feature which contributes to the specificity of the syndrome, is the diffuse sclerosis of the white matter. If one attempts to classify these lesions into the conventional group of leucodystrophies, then they belong to the very large and ill-defined group of orthochromatic leucodystrophies (for a review, see Peiffer 1970b). Lipid analyses of postmortem brain tissue in 2 patients revealed a decrease in the lipid content of the white matter. No such effect was noted in grey matter. This drastic reduction - true for neutral lipids, glycolipids and phospholipids - could be interpreted as the chemical manifestation of demyelination. HFA deficiency occurring both in white and grey matter was the striking biochemical feature in our patients. This finding is rather unique and could perhaps be regarded as a primary event in this disease. A deficiency of the ?-hydroxylating system is the most likely cause of this familial disorder.

J.J. Martin; G. Van Dessel; A. Lagrou; A.M. De Barsy; W. Dierick

1974-01-01T23:59:59.000Z

494

Joint Routing, Scheduling And Power Control For Multihop Wireless Networks With Multiple Antennas  

E-Print Network [OSTI]

We consider the problem of Joint Routing, Scheduling and Power-control (JRSP) problem for multihop wireless networks (MHWN) with multiple antennas. We extend the problem and a (sub-optimal) heuristic solution method for JRSP in MHWN with single antennas. We present an iterative scheme to calculate link capacities(achievable rates) in the interference environment of the network using SINR model. We then present the algorithm for solving the JRSP problem. This completes a feasible system model for MHWN when nodes have multiple antennas. We show that the gain we achieve by using multiple antennas in the network is linear both in optimal performance as well as heuristic algorithmic performance.

Vangala, Harish; Sharma, Prof Vinod

2011-01-01T23:59:59.000Z

495

Pointright: a system to redirect mouse and keyboard control among multiple machines  

DOE Patents [OSTI]

The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

Johanson, Bradley E. (Palo Alto, CA); Winograd, Terry A. (Stanford, CA); Hutchins, Gregory M. (Mountain View, CA)

2008-09-30T23:59:59.000Z

496

A stable isotope dual-labelling approach to detect multiple insemination in un-irradiated and irradiated Anopheles arabiensis mosquitoes  

Science Journals Connector (OSTI)

The effect of irradiation on the incidence of multiple insemination in a laboratory strain of Anopheles arabiensis is described. Multiple insemination was studied by labelling semen with different stable isotopes. Image: Spermatozoa inside the testes of An. arabiensis.

Michelle EH Helinski; Rebecca C Hood; Bart GJ Knols

2008-04-10T23:59:59.000Z

497

The present invention relates to automated methods of introducing multiple nucleic acid sequences into one or more target cells.  

DOE Patents [OSTI]

The present invention relates to automated methods of introducing multiple nucleic acid sequences into one or more target cells.

Church, George M. (Brookline, MA); Wang, Harris H. (Cambridge, MA); Isaacs, Farren J. (Brookline, MA)

2012-04-10T23:59:59.000Z

498

A Software Tool for Concurrent Consideration of Multiple Codes & Standards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A Software Tool for Concurrent Consideration of Multiple Codes & Standards A Software Tool for Concurrent Consideration of Multiple Codes & Standards Speaker(s): Georg Reichard Date: August 29, 2002 - 12:00pm Location: Bldg. 90 Dr. Reichard will give a brief overview of the Research Areas at the Institute for Structural Analysis at the Graz University of Technology and then focus on a software development project, which aims at facilitating concurrent consideration of multiple codes and standards for European buildings. The software development project started in 1998 and was initially focused on integrating the consideration of standards on thermal, hydrothermal and acoustic performance of building components. Currently, the software is being expanded to include consideration of multiple international standards for building components as well as whole buildings

499

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

500

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin